共 50 条
- [3] ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 315 - 344
- [4] Towards a Pattern-Based Security Methodology to Build Secure Information Systems WOSIS 2011: SECURITY IN INFORMATION SYSTEMS, 2011, : 59 - +
- [5] INTELLIGENT MANAGEMENT OF THE LEGAL REGIME OF ACCESS IN THE INFORMATION SECURITY SYSTEM PROCEEDINGS OF THE7TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL. 1, 2020, : 131 - 133
- [7] Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 247 - 254
- [8] Method for assessing efficiency of the information security management system 22ND INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2018), 2018, 210
- [9] An enhanced smartphone security model based on information security management system (ISMS) Electronic Commerce Research, 2014, 14 : 321 - 348