From risk analysis to security requirements

被引:35
作者
Gerber, M [1 ]
von Solms, R [1 ]
机构
[1] Port Elizabeth Technikon, Dept Informat Technol, ZA-6000 Port Elizabeth, South Africa
关键词
D O I
10.1016/S0167-4048(01)00706-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:577 / 584
页数:8
相关论文
共 19 条
[1]  
Bruce G., 1997, SECURITY DISTRIBUTED
[2]  
CHECKLEY J, 1992, COMPUTER SECURITY RE
[3]  
COWCHER R, 1992, COMPUTER SECURITY RE
[4]  
*GISA, 1995, IT BAS PROT MAN
[5]  
Humphreys E. J., 1998, GUIDE RISK ASSESSMEN
[6]  
JACOBSON RV, 1996, CORA COST RISK ANAL
[7]  
Moses R. H., 1992, COMPUTER SECURITY RE
[8]  
OWENS S, 1998, INFORMATION SECURITY
[9]  
Pfleeger C., 1997, SECURITY COMPUTING, V5th, DOI DOI 10.5555/48805
[10]  
WILLS M, 1999, COMMUNICATION