2004
DOI: 10.1007/978-3-540-24707-4_56
|View full text |Cite
|
Sign up to set email alerts
|

Introduction and Evaluation of Development System Security Process of ISO/IEC TR 15504

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Protection profile progress is like following. And next steps are removes the risk items by the redundancy [6][9] [10].…”
Section: Security Profile Lifecyclementioning
confidence: 99%
“…Protection profile progress is like following. And next steps are removes the risk items by the redundancy [6][9] [10].…”
Section: Security Profile Lifecyclementioning
confidence: 99%
“…Though any cases, if the compromises are occurred, your money and your job may be missed. Therefore, Security countermeasures must be implemented to prevent threat agents from successfully achieving these goals [1][2][3][4]. This paper proposes a countermeasure design flow considering attacks (including threat), security services, and appropriate security technologies.…”
Section: Introductionmentioning
confidence: 99%