期刊文献+

计算机软件安全问题的防御措施 被引量:2

下载PDF
导出
摘要 为了可以让软件能够更好的为人们所服务,本文将以软件带给人们的安全问题还有怎样进行有效的防御这些方面进行研究。
作者 梅尧明
出处 《电子技术与软件工程》 2019年第8期198-198,共1页 ELECTRONIC TECHNOLOGY & SOFTWARE ENGINEERING
  • 相关文献

参考文献4

二级参考文献32

  • 1Rushby J.Security requirements specifications:how and what. http://www.csl.sri.com/users/rushby/papers/sreis01.ps.gz . 2010
  • 2Common Criteria Implementation Board.Common cri-teria for information technology security evalution-part2:security functional requirements. http://csrc.nist.gov/cc/ . 2010
  • 3Saeki M,Kaiya H.Using common criteria as reusable knowledge in security requirements elicitation. http://sunsite.informatik.rwth-aachen.de/Publications/CEUR-WS/Vol-413/paper09.pdf . 2010
  • 4Srivatanakul T,Clark J A,Polack F.Writing effectivesecurity abuse case. http://www.cs.york.ac.uk/ftpdir/reports/YCS-2004-375.pdf . 2010
  • 5Sindre G.Capturing security requirement through misuse cases. http://www.nik.no/2001/21-sindre.pdf . 2010
  • 6Sindre G,Firesmith D G,Opdahl A L.A reuse-based approach to determining security requirements. http://citeseerx.ist.psu.edu/viewdoc/download doi=10.1.1.14.2904&rep=rep1&type=pdf . 2010
  • 7Diallo M H,Romero-mariona J,Sim S E,et al.A com-parative evaluation of three approaches to sepcifying security requirements. http://www.di.unipi.it/REFSQ06/Papers/02%20Diallo.pdf . 2010
  • 8Firesmith D G.Engineering security requirements. J of Object Technology . 2003
  • 9information technology-secu-rity techniques-evaluation criteria for IT security-Part1:introduction and general model. ISO/IEC15408-1:2005 . 2010
  • 10information technology-secu-rity techniques-evaluation criteria for IT security-Part2:security function requirements. ISO/IEC15408-2:2005 . 2010

共引文献23

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部