共 50 条
- [22] Model Driven Implementation of Security Management Process MODELSWARD: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2017, : 229 - 238
- [23] Ethical hacking: The security justification redux SOCIAL IMPLICATIONS OF INFORMATION AND COMMUNICATION TECHNOLOGY, PROCEEDINGS, 2002, : 374 - 379
- [24] Evaluation Process Management Software for Security Evaluation 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 1628 - 1631
- [25] Definition of security requirement items and its process to security and progress management INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 1084 - 1089
- [28] A role-based process security model in business process management Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1596 - 1599
- [29] Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 332 - 337
- [30] Implementation of IT Security and Risk Management Process for an Academic Platform DIGITAL SCIENCE, 2019, 850 : 379 - 386