Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
ACM Transactions on Information and System Security (TISSEC)
Hacking Exposed; Network Security Secrets and Solutions
Hacking Exposed; Network Security Secrets and Solutions
Technical reference architectures
IBM Systems Journal
The impact of forensic computing on telecommunications
IEEE Communications Magazine
The essence of information assurance and its implications for the Ada community
Proceedings of the 2002 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies
Designing high integrity systems using aspects
Integrity and internal control in information systems V
Managing information systems infrastructure: lessons from a VOIP-system implementation
CIT'09 Proceedings of the 3rd International Conference on Communications and information technology
A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements
International Journal of Information Security and Privacy
Hi-index | 0.00 |
The task of developing information technology (IT) solutions that consistently and effectively apply security principles has many challenges, including: the complexity of integrating the specified security functions within the several underlying component architectures found in computing systems, the difficulty in developing a comprehensive set of baseline requirements for security, and a lack of widely accepted security design methods. With the formalization of security evaluation criteria into an international standard known as Common Criteria, one of the barriers to a common approach for developing extensible IT security architectures has been lowered; however, more work remains. This paper describes a systematic approach for defining, modeling, and documenting security functions within a structured design process in order to facilitate greater trust in the operation of resulting IT solutions.