Information system security compliance to FISMA standard: a quantitative measure
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[2] Chaomei Chen,et al. Bridging the Gap: The Use of Pathfinder Networks in Visual Navigation , 1998, J. Vis. Lang. Comput..
[3] Rayford B. Vaughn,et al. Reducing misunderstanding of software requirements by conceptualization of mental models using pathfinder networks , 2004 .
[4] D. W. Dearholt,et al. Properties of pathfinder networks , 1990 .
[5] Rayford B. Vaughn,et al. Understanding Software Requirements Using Pathfinder Networks , 2004 .
[6] Roger W. Schvaneveldt,et al. Pathfinder associative networks: studies in knowledge organization , 1990 .
[7] Kevin Henry. Risk Management and Analysis , 2011, Encyclopedia of Information Assurance.
[8] Marianne M. Swanson,et al. Recommended Security Controls for Federal Information Systems , 2005 .
[9] Thomas H. Cormen,et al. Introduction to algorithms [2nd ed.] , 2001 .
[10] L. Johnson,et al. Minimum Security Requirements for Federal Information and Information Systems , 2006 .
[11] R. Ross,et al. The new FISMA standards and guidelines changing the dynamic of information security for the federal government , 2004, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[12] Jan W. Buzydlowski,et al. Real-time author co-citation mapping for online searching , 2003, Inf. Process. Manag..
[13] Rossouw von Solms,et al. Management of risk in the information age , 2005, Comput. Secur..
[14] Will Ozier,et al. Risk Analysis and Assessment , 2000 .
[15] Matt Bishop,et al. Computer Security: Art and Science , 2002 .