References


Anderson, R. J. (1994). Whither Cryptography. Inf. Management & Com. Security, 2(5), 13–20.

ANSI (1998). The Elliptic Curve Digital Signature Algorithm (ECDSA). X9.62 Standard. Washington, DC: ANSI.

Aresenault, A., et al., (2002). Internet X.509 Public Key Infrastructure Roadmap. PKIX Draft Standard. Reston: IETF.

ASC X12 (2001). X12 Standard Release 4050. Washington, DC: ANSI.

BSI (1999). Code of practice for information security management. British Standard 7799. London: British Standards Institute.

Cheswick, W. & Bellovin, S. (1994). Firewalls and Internet Security. Reading, MA: Addison-Wesley.

Department of Defense (1985). Trusted computer system evaluation criteria. DOD 5200.28-STD. Washington, DC: U.S. DoD.

Dierks, T. & Allen, C. (1999). Transport Layer Security. Standard RFC 2246. Reston: IETF.

Eastlake, D. & Jones, P. (2001). Secure Hash Algorithm - 1. RFC 3174 Standard. Reston: IETF.

Forrester, J. (1961). Industrial Dynamics. Cambridge, MA: MIT Press.

Foti, J. (ed.). (2001). Advanced Encryption Standard. FIPS Draft. Washington, DC: DoC.

Foundation for Intelligent Physical Agents (2001). FIPA Security SIG Request For Information. F-OUT-00065 Deliverable. Concord: FIPA.

Freed, N. (1996). Multipurpose internet mail extensions. RFC 2045 Standard. Reston: IETF.

Freier, A.O., et al. (1996). Secure Sockets Layer Protocol (version 3). Mountain View: Netscape Corp. Available at: http://wp.netscape.com/eng/ssl3/index.html.

Gonzales, J.J. & Sawicka, A. (2002). A framework for human factors in information security. Proceedings of the WSEAS Conference on Information Security. Rio de Janeiro: WSEAS.

Griss, L.M. (2001). Accelerating development with agent components. IEEE Computer, 5(34), 37–43.

Gutmann, P. (2002). PKI: It's not dead, just resting. IEEE Computer, 35(8), 41–49.

Harold, E.R. & Means, W.S. (2001). XML in a Nutshell. Cambridge, MA: O'Reilly & Assoc.

ISO (1995a). IT, open systems interconnection: Security frameworks in open systems. IS 10181/1 through 7. Geneva: ISO.

ISO (1995b). Quality systems. Standards IS0 9001 through 9003. Geneva: ISO.

ISO (1997). Quality management and quality system elements. Standards IS0 9004/1 through 2. Geneva: ISO.

ISO (1999). Common criteria, security techniques — evaluation criteria for IT security. IS 15408, parts 1 through 3. Geneva: ISO.

ISO (2000). Code of practice for inf. sec. management. ISO 17799 Standard. Geneva: ISO.

ITU-T (1997). IT — Open systems interconnection — The directory: Overview of concepts, models and services. Recommendation X.500. Geneva: ISO.

ITU-T (2000). Public-key and attribute certificate frameworks. X.509 Standard. Geneva: ISO.

Kalakota, R. (1999). e-Business: Roadmap for Success. Reading, MA: Addison Wesley.

Kemmerer, R.A. & Vigna, G. (2002). Intrusion detection: A brief history and overview. IEEE Computer, Security & Privacy, 35(5), 27–30.

Kocher, P.,Jaffe, J. & Jun, B. (2000). Differential power analysis. White paper. San Francisco, CA: Cryptography Research Inc.

McFarlan, F.W. (1984). Information technology changes the way you compete. Harvard Business Review. Boston, MA: Harvard Business School.

Miller, S.K. (2001). Facing the challenge of wireless security. IEEE Computer, 35(7), 16–18.

Porter, M.E. & Millar, V.E. (1985). How information gives you competitive advantage. Harvard Business Review, 7(8), 149–169.

Raepple, M. (2001). Sicherheitskonzepte fuer das Internet. Heidelberg: dpunkt-Verlag.

Ramsdell, B. (1999). S/MIME message specification. Standard RFC 2633. Reston: IETF.

RSA Labs (2002). PKCS — RSA Cryptography Standard, v 2.1. Bedford: RSA Security.

Stallings, W. (1999). Cryptography and Network Security. London: Prentice Hall.

Sterman, J.D. (2000). Business Dynamics. Boston, MA: Irwin-McGraw Hill.

Sweiger, M. (1999). B2C e-commerce information systems. NUMA-QPublications. New York: IBM.

Thayer R., et al. (1998). IP security document roadmap. RFC 2411. Reston: IETF.

Tr ek, D. (2003). An integral framework for information systems security management. Elsevier Computers & Security, 22(4), 337–360.

UN Economic Commission for Europe (1993). Electronic data interchange for administration, commerce and transport-syntax rules. ISO 9735. Geneva: ISO.




Intelligent Enterprises of the 21st Century
Intelligent Enterprises of the 21st Century
ISBN: 1591401607
EAN: 2147483647
Year: 2003
Pages: 195

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net