{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:45:09Z","timestamp":1725551109859},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121883"},{"type":"electronic","value":"9783642121890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12189-0_44","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T18:11:05Z","timestamp":1270059065000},"page":"510-519","source":"Crossref","is-referenced-by-count":2,"title":["A Study on Comparative Analysis of the Information Security Management Systems"],"prefix":"10.1007","author":[{"given":"Heasuk","family":"Jo","sequence":"first","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"International Standard ISO\/IEC 15408, Common Methodology for Information Technology Security Evaluation,Version 3.1, 2006.10","key":"44_CR1"},{"unstructured":"International Standard ISO\/IEC 15408, Common Criteria for Information Technology Security Envluation, Part1,Version 3.1, 2006.10","key":"44_CR2"},{"unstructured":"International Standard ISO\/IEC 15408, Common Criteria for Information Technology Security Envluation, Part2,Version 3.1, 2006.10","key":"44_CR3"},{"unstructured":"International Standard ISO\/IEC 15408, Common Criteria for Information Technology Security Envluation, Part2,Version 3.1, 2006.10","key":"44_CR4"},{"unstructured":"Japan Information processing development corporation, JIS Q 27001 (ISO\/IEC 27001:2005) Information security management sytem conformity assessment scheme (2006)","key":"44_CR5"},{"unstructured":"JIPDEC, \n                    \n                      http:\/\/www.isms.jipdec.jp\/en\/index.html","key":"44_CR6"},{"unstructured":"BSI, BS7799 Part 2: Code of Practice for Information Security Management, British Standards Institute (1999)","key":"44_CR7"},{"unstructured":"ISO, International Standards ISO\/IEC 27001, Information technology Security techniques-Information security management systems-requirements (2005)","key":"44_CR8"},{"unstructured":"http:\/\/www.iso27001security.com\/html\/27000.html","key":"44_CR9"},{"unstructured":"IT Baseline Protection Manual (2004)","key":"44_CR10"},{"unstructured":"IT Baseline protection Manual Layer model, \n                    \n                      http:\/\/www.bsi.bund.de\/english\/gshb\/manual\/schichtenmodell.htm","key":"44_CR11"},{"unstructured":"DoD 5810.1-M: DITSCAP Applicatio Manual (2001)","key":"44_CR12"},{"unstructured":"Valletta, A.M.: DoD Instruction (1997)","key":"44_CR13"},{"unstructured":"DoD Information Assurance, \n                    \n                      http:\/\/www.ati4it.com\/DOD","key":"44_CR14"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12189-0_44.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:04:40Z","timestamp":1619769880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12189-0_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121883","9783642121890"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12189-0_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}