共 50 条
- [31] Management of groups and group keys in multi-level security environments COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2007, 4680 : 75 - 80
- [32] Security Management in the industrial Automation Requirements and Functions AUTOMATION 2011, 2011, 213 : 191 - 194
- [33] A Scalable Method for Partitioning Workflows with Security Requirements over Federated Clouds 2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 122 - 129
- [34] Using the common criteria to elicit security requirements with use cases PROCEEDINGS OF THE IEEE SOUTHEASTCON 2006, 2006, : 273 - 278
- [36] A comparison of the common criteria with proposals of information systems security requirements FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 654 - +
- [37] Ontological mapping of common criteria's security assurance requirements NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 85 - +
- [38] Security Requirements Elicitation Using Method Weaving and Common Criteria MODELS IN SOFTWARE ENGINEERING, 2009, 5421 : 185 - +
- [39] Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 814 - 820
- [40] The Methodology of Security Management Cost Reduction using Security Level Lifecycle INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 205 - 214