Analiza in zasnova programske rešitve vodenja evidenc na uradu Vlade Republike Slovenije za varovanje tajnih podatkov

Authors

  • Miran Skobe
  • Tomislav Rozman

Keywords:

.

Abstract

.

References

Board, I.-S. S. (1998). IEEE 830: Recomended Practice for Software Requirements Specification. Practice.

Board, I.-S. S. (1998). IEEE 830: Recomended Practice for Software Requirements Specification. Practice.

Business Process Model and Notation. 2012. BPMN.info. Dostopno na: http://www.bpmn.info/ (25. 11 2012).

Carnegie-Mellon-SEI. (2010). CMMI® for Acquisition, Version 1.3 CMMI-ACQ. Engineering (p. 438). Dostopno na: http://www.sei.cmu.edu (16. 2. 2013).

Carnegie-Mellon-SEI. (2010). CMMI® for Acquisition, Version 1.3 CMMI-ACQ. Engineering.

CMMI for Acquisition, Version 1.2. 2007. Software Ingeniring Institute. Dostopno na: http://www.sei.cmu.edu/reports/07tr017.pdf, (20. 10. 2012).

Disterer, G. (2013). ISO/IEC 27000, 27001 and 27002 for Information Security Management. Journal of Information Security, 4, 92–100.

Disterer, G. (2013). ISO/IEC 27000, 27001 and 27002 for Information Security Management. Journal of Information Security, 4, 92–100. Dostopno na: http://doi.org/10.4236/jis.2013.42011 (29. 10. 29015).

ISO/IEC 27000. 2012. International organisation of standardization. Dostopno na: http://www.iso.org/iso/home/standards/management-standards/iso27001.htm, (24. 11. 2012).

ISO/IEC/JTC1. (2014). ISO/IEC 19510:2013 - Information technology - Object Management Group Business Process Model and Notation. Dostopno na: http://www.iso.org/iso/catalogue_detail.htm?csnumber=62652 (6. 1. 2015)

ISO/IEC/JTC1. (2014). ISO/IEC 19510:2013 - Information technology -- Object Management Group Business Process Model and Notation.

Kaiser, F. M. (2003). Access to classified information: seeking security clearances for state and local officials and personnel. Government Information Quarterly, 20(3), 213–232. Dostopno na: http://doi.org/10.1016/S0740-624X(03)00040-6 (29. 10. 29015).

Myers, G. J. 2004 The art of software testing 2nd edition. New Jersey: John Wiley & Sons, Inc.

Relyea, H. C. (2011). Security classified and controlled information: History, status, and emerging management issues. In Classified Information: Protections and Issues (pp. 1–42).

Rosenbaum, R. A., Tenzer, M. J., Unger, S. H., Alstyne, W. Van, & Knight, J. (1983). Academic Freedom and the Classified Information System. Science, 219(4582), 257–259.

Sklep o ustanovitvi, nalogah in organizaciji Urada Vlade Republike Slovenije za varovanje tajnih podatkov. 2002. Uradni list RS, št. 6/02. Dostopno na: http://www.uradni-list.si/1/content?id=21439 (16. 2. 2013).

Skobe, M. (2013). Programska rešitev vodenja evidenc po Zakonu o tajnih podatkih na Uradu Vlade Republike Slovenije za varovanje tajnih podatkov. Maribor. Fakulteta DOBA.

Software testing fundamentals. 2012. Software Testing Fundamentals. Dostopno na: http://softwaretestingfundamentals.com/ (2. 9. 2012).

STANDARD IEEE 830-1998. 1998. Institute of Electrical and Electronics Engineers. Dostopno na: http://standards.ieee.org/findstds/standard/830-1998.html (15. 12. 2012).

Zakon o tajnih podatkih. 2001. Uradni list RS, št. 87/2001. Dostopno na: http://www.uradni-list.si/1/objava.jsp?urlid=200187&stevilka=4450 (16. 2. 2013).

Published

2019-07-05

Issue

Section

Original article

How to Cite

Skobe, M. ., & Rozman, T. . (2019). Analiza in zasnova programske rešitve vodenja evidenc na uradu Vlade Republike Slovenije za varovanje tajnih podatkov. Mednarodno Inovativno Poslovanje = Journal of Innovative Business and Management, 7(2). http://journal.doba.si/OJS/index.php/jimb/article/view/103