SECURITY EVALUATION IN INFORMATION TECHNOLOGY STANDARDS

被引:0
|
作者
GENTILE, F [1 ]
GIURI, L [1 ]
GUIDA, F [1 ]
MONTOLIVO, E [1 ]
VOLPE, M [1 ]
机构
[1] SIP,I-00163 ROME,ITALY
关键词
D O I
10.1016/0167-4048(94)90044-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
[No abstract available]
引用
收藏
页码:647 / 650
页数:4
相关论文
共 50 条
  • [21] Financial data breaches in the US retail economy: Restoring confidence in information technology security standards
    Hemphill, Thomas A.
    Longstreet, Phil
    TECHNOLOGY IN SOCIETY, 2016, 44 : 30 - 38
  • [22] A security evaluation criteria for baseline security standards.
    Brooks, WJ
    Warren, M
    Hutchinson, W
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 79 - 89
  • [23] Information security: Technology and the law
    Marvin, CR
    Levinson, CK
    TOWARD AN ELECTRONIC PATIENT RECORD '98 CONFERENCE AND EXPOSITION, PROCEEDINGS - VOLS 1-3, 1998, : A123 - A126
  • [24] Confidentiality and security in information technology
    Lefton, AB
    GENERATIONS-JOURNAL OF THE AMERICAN SOCIETY ON AGING, 1997, 21 (03): : 50 - 52
  • [25] PERSPECTIVES IN INFORMATION TECHNOLOGY SECURITY
    HIGHLAND, HJ
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 440 - 446
  • [26] A Systematic Management Method of ISO Information Security Standards for Information Security Engineering Environments
    Suhaimi, Ahmad Iqbal Hakim
    Manji, Takashi
    Goto, Yuichi
    Cheng, Jingde
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 370 - 384
  • [27] Standardization in Information Technology Security
    Fal’ O.M.
    Cybernetics and Systems Analysis, 2017, 53 (1) : 78 - 82
  • [28] Perspectives in information technology security
    Highland, H.J.
    Proceedings of the IFIP World Computer Congress, 1992, 2
  • [29] Quantum information security technology
    Zhao, Sheng-Mei
    Yao, Jia
    Li, Fei
    Zheng, Bao-Yu
    Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2005, 25 (03): : 1 - 7
  • [30] Technology Standards pros aid homeland security
    McMillan, K
    COMPUTER, 2002, 35 (05) : 104 - 105