DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, M | ko |
dc.contributor.author | Kim, H | ko |
dc.contributor.author | Kim, E | ko |
dc.contributor.author | Kim, Sehun | ko |
dc.date.accessioned | 2007-11-21T02:13:10Z | - |
dc.date.available | 2007-11-21T02:13:10Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2005 | - |
dc.identifier.citation | COTS-BASED SOFTWARE SYSTEMS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3412, pp.11 - 11 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/2077 | - |
dc.description | Not a full paper | en |
dc.description.sponsorship | This work was sponsored in part by the Korean Ministry of Information and Communication in the context of University IT Research Center Project. | en |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.title | Decision on replacing components of security functions in COTS-based information systems | - |
dc.type | Article | - |
dc.identifier.wosid | 000228725700004 | - |
dc.identifier.scopusid | 2-s2.0-24344450752 | - |
dc.type.rims | ART | - |
dc.citation.volume | 3412 | - |
dc.citation.beginningpage | 11 | - |
dc.citation.endingpage | 11 | - |
dc.citation.publicationname | COTS-BASED SOFTWARE SYSTEMS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Sehun | - |
dc.contributor.nonIdAuthor | Choi, M | - |
dc.contributor.nonIdAuthor | Kim, H | - |
dc.contributor.nonIdAuthor | Kim, E | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.