How Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond
journal contribution
posted on 2022-09-29, 03:09 authored by Nan Sun, Chang-Tsun LiChang-Tsun Li, Hin Chan, Md Zahidul Islam, Md Rafiqul Islam, Warren ArmstrongHow Do Organizations Seek Cyber Assurance? Investigations on the Adoption of the Common Criteria and Beyond
History
Related Materials
- 1.
Location
Piscataway, N.J.Language
EnglishPublication classification
C1 Refereed article in a scholarly journalJournal
IEEE AccessVolume
10Pagination
71749-71763ISSN
2169-3536eISSN
2169-3536Publisher
Institute of Electrical and Electronics Engineers (IEEE)Usage metrics
Categories
No categories selectedKeywords
AustraliaCertificationCommon criteriaComputer ScienceComputer Science, Information SystemsComputer securitycyber securityCYBERSECURITYEngineeringEngineering, Electrical & ElectronicOrganizationsPRIVACYprotection profileRISKRisk managementScience & TechnologySecuritysecurity standard and certificationStandards organizationsTechnologyTelecommunicationstrusted system
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC

