Strategies for cost efficient security evaluations
暂无分享,去创建一个
[1] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[2] Jan H. P. Eloff,et al. A common criteria framework for the evaluation of information technology systems security , 1997, SEC.
[3] Jussipekka Leiwo. A Mechanism for Deriving Specifications of Security Functions in the CC Framework , 1999, DEXA.
[4] Rossouw von Solms,et al. From Trusted Information Security Controls to a Trusted Information Security Environment , 2000, SEC.
[5] Peter G. Neumann,et al. Principled assuredly trustworthy composable architectures , 2003 .
[6] Richard E. Smith. Cost profile of a highly assured, secure operating system , 2001, TSEC.
[7] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.