Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 김태훈 | * |
dc.date.accessioned | 2017-08-25T03:08:13Z | - |
dc.date.available | 2017-08-25T03:08:13Z | - |
dc.date.issued | 2006 | * |
dc.identifier.isbn | 3540465375 | * |
dc.identifier.isbn | 9783540465379 | * |
dc.identifier.issn | 0302-9743 | * |
dc.identifier.other | OAK-17737 | * |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/235623 | - |
dc.description.abstract | A PP (protection profile) defines an implementation-independent set of security requirements for a category of Target of Evaluations. Consumers or owners can therefore construct or cite a PP to express their security needs without reference to any specific IT products. Generally, PP contains security assurance requirements about the security of development environment for IT product or system and PP can applied to ubiquitous software development site. This paper proposes some security environments for ubiquitous software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827. © Springer-Verlag Berlin Heidelberg 2006. | * |
dc.language | English | * |
dc.title | Security requirements for ubiquitous software development site | * |
dc.type | Conference Paper | * |
dc.relation.volume | 4252 LNAI - II | * |
dc.relation.index | SCOPUS | * |
dc.relation.startpage | 836 | * |
dc.relation.lastpage | 843 | * |
dc.relation.journaltitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | * |
dc.identifier.scopusid | 2-s2.0-33750721746 | * |
dc.author.google | Kim T.-H. | * |
dc.date.modifydate | 20240322133514 | * |