Art
J-GLOBAL ID:201702227253200929
Reference number:17A0009580
Visualization of IoT Security Requirements using CC-Case
CC-Caseを用いたIoTセキュリティ要件の可視化
Author (4):
,
,
,
Material:
Volume:
2016
Issue:
MBL-80
Page:
Vol.2016-MBL-80,No.5,1-8 (WEB ONLY)
Publication year:
Aug. 17, 2016
JST Material Number:
U0451A
Document type:
Proceedings
Article type:
原著論文
Country of issue:
Japan (JPN)
Language:
JAPANESE (JA)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
,
,
,
,
,
,
,
,
,
Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
,
,
,
JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection
, Computer networks
Reference (37):
-
Common Criteria for Information Technology Security Evaluation, http://www.commoncriteriaportal.org/cc/
-
セキュリティ評価基準(CC/CEM) http://www.ipa.go.jp/security/jisec/cc/index.html
-
田淵治樹:国際規格による情報セキュリティの保証手法,日科技連,2007年7月
-
ISO/IEC15026-2-2011,Systems and Software engineeringPart2:Assurance case
-
金子朋子,山本修一郎,田中英彦: CC-Case~コモンクライテリア準拠のアシュアランスケースによるセキュリティ要求分析・保証の統合手法, 情報処理学会論文誌 55巻9号(2014)
more...
Terms in the title (4):
Terms in the title
Keywords automatically extracted from the title.
,
,
,
Return to Previous Page