Analiza in zasnova programske rešitve vodenja evidenc na uradu Vlade Republike Slovenije za varovanje tajnih podatkov
Keywords:
.Abstract
.
References
Board, I.-S. S. (1998). IEEE 830: Recomended Practice for Software Requirements Specification. Practice.
Board, I.-S. S. (1998). IEEE 830: Recomended Practice for Software Requirements Specification. Practice.
Business Process Model and Notation. 2012. BPMN.info. Dostopno na: http://www.bpmn.info/ (25. 11 2012).
Carnegie-Mellon-SEI. (2010). CMMI® for Acquisition, Version 1.3 CMMI-ACQ. Engineering (p. 438). Dostopno na: http://www.sei.cmu.edu (16. 2. 2013).
Carnegie-Mellon-SEI. (2010). CMMI® for Acquisition, Version 1.3 CMMI-ACQ. Engineering.
CMMI for Acquisition, Version 1.2. 2007. Software Ingeniring Institute. Dostopno na: http://www.sei.cmu.edu/reports/07tr017.pdf, (20. 10. 2012).
Disterer, G. (2013). ISO/IEC 27000, 27001 and 27002 for Information Security Management. Journal of Information Security, 4, 92–100.
Disterer, G. (2013). ISO/IEC 27000, 27001 and 27002 for Information Security Management. Journal of Information Security, 4, 92–100. Dostopno na: http://doi.org/10.4236/jis.2013.42011 (29. 10. 29015).
ISO/IEC 27000. 2012. International organisation of standardization. Dostopno na: http://www.iso.org/iso/home/standards/management-standards/iso27001.htm, (24. 11. 2012).
ISO/IEC/JTC1. (2014). ISO/IEC 19510:2013 - Information technology - Object Management Group Business Process Model and Notation. Dostopno na: http://www.iso.org/iso/catalogue_detail.htm?csnumber=62652 (6. 1. 2015)
ISO/IEC/JTC1. (2014). ISO/IEC 19510:2013 - Information technology -- Object Management Group Business Process Model and Notation.
Kaiser, F. M. (2003). Access to classified information: seeking security clearances for state and local officials and personnel. Government Information Quarterly, 20(3), 213–232. Dostopno na: http://doi.org/10.1016/S0740-624X(03)00040-6 (29. 10. 29015).
Myers, G. J. 2004 The art of software testing 2nd edition. New Jersey: John Wiley & Sons, Inc.
Relyea, H. C. (2011). Security classified and controlled information: History, status, and emerging management issues. In Classified Information: Protections and Issues (pp. 1–42).
Rosenbaum, R. A., Tenzer, M. J., Unger, S. H., Alstyne, W. Van, & Knight, J. (1983). Academic Freedom and the Classified Information System. Science, 219(4582), 257–259.
Sklep o ustanovitvi, nalogah in organizaciji Urada Vlade Republike Slovenije za varovanje tajnih podatkov. 2002. Uradni list RS, št. 6/02. Dostopno na: http://www.uradni-list.si/1/content?id=21439 (16. 2. 2013).
Skobe, M. (2013). Programska rešitev vodenja evidenc po Zakonu o tajnih podatkih na Uradu Vlade Republike Slovenije za varovanje tajnih podatkov. Maribor. Fakulteta DOBA.
Software testing fundamentals. 2012. Software Testing Fundamentals. Dostopno na: http://softwaretestingfundamentals.com/ (2. 9. 2012).
STANDARD IEEE 830-1998. 1998. Institute of Electrical and Electronics Engineers. Dostopno na: http://standards.ieee.org/findstds/standard/830-1998.html (15. 12. 2012).
Zakon o tajnih podatkih. 2001. Uradni list RS, št. 87/2001. Dostopno na: http://www.uradni-list.si/1/objava.jsp?urlid=200187&stevilka=4450 (16. 2. 2013).
Downloads
Published
Issue
Section
License
The authors retain rights under the Creative Commons Attribution-ShareAlike 4.0 International CC BY-SA 4.0. Authors assign copyright or license the publication rights in their articles, including abstracts, to MIP=JIBM. This enables us to ensure full copyright protection and to disseminate the article, and of course MIP=JIBM, to the widest possible readership in electronic format. Authors are themselves responsible for obtaining permission to reproduce copyright material from other sources.