共 50 条
- [2] From ISO/IEC 27002:2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 238 - 257
- [3] A Comparative Review of Cloud Security Proposals with ISO/IEC 27002 [J]. WOSIS 2011: SECURITY IN INFORMATION SYSTEMS, 2011, : 3 - 12
- [5] A Database System for Effective Utilization of ISO/IEC 27002 [J]. FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 607 - 612
- [6] Better Security Assessment Communication: Combining ISO 27002 Controls with UML Sequence Diagrams [J]. 3RD INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2022), 2022, : 49 - 56
- [8] Business Model for the Security of a Large-Scale PACS, Compliance with ISO/27002:2013 Standard [J]. Journal of Digital Imaging, 2015, 28 : 481 - 491
- [10] On Scalable Security Audit for Web Application According to ISO 27002 [J]. COMPUTER NETWORKS, 2011, 160 : 289 - 297