A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System.
Sung-Ja ChoiYeon-hee KangGang-Soo LeePublished in: ICCSA (2) (2005)
Keyphrases
- information security
- open source software
- open source
- security issues
- information assurance
- countermeasures
- security level
- security requirements
- network security
- information systems
- computer security
- intrusion detection
- information security management
- source code
- smart card
- e government
- open source projects
- open source software development
- software development
- smart grid
- mailing lists
- cyber defense
- free software
- risk assessment
- user authentication
- real world
- risk analysis
- sensitive data
- anomaly detection
- database systems