Skip to main content
Log in

Report: Security Management Convergence via SIM (Security Information Management)—A Requirements Perspective

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

REFERENCES

  1. Ian A. Finlay, A brief tour of the Simple Network Management Protocol, CERT Coordination Center, http://www.cert.org/archive/pdf/snmp.pdf

  2. Greg Shipley, Security information management tools, Network Computing, http://www.networkcomputing.com/1307/1307f2.html, April 1, 2002.

  3. Timothy J. Shimeall, Casey J. Dunlevy, and Phil Williams, Intelligence analysis for internet security: Ideas, barriers and possibilities, CERT Analysis Center, http://www.cert.org/archive/html/spie.html

  4. Common Vulnerabilities and Exposures (CVE) Site, http://cve.mitre.org

  5. http://www.iso.ch/iso/en/ISOOnline.frontpage

  6. http://www.iso.ch/iso/en/prods-services/popstds/informationsecurity.html

  7. Office of the Secretary, Department of Health and Human Services, Health Insurance Reform: Security Standards; Final Rule, Federal Register, http://edocket.access.gpo.gov/2003/pdf/03–3877.pdf, February 20, 2003.

  8. Federal Trade Commission, How to comply with the privacy of consumer financial information rule of the Gramm-Leach-Bliley Act, A Guide for Small Business from the Federal Trade Commission, http://www.ftc.gov/bcp/conline/pubs/buspubs/glblong.htm

  9. Helen Delaney and Rene van de Zande, Co-Editors, A Guide to EU Standards and Conformity Assessment, NIST Special Publication 951, http://ts.nist.gov/ts/htdocs/210/gsig/eu-guides/sp951/sp951.htm

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kelley, D. Report: Security Management Convergence via SIM (Security Information Management)—A Requirements Perspective. Journal of Network and Systems Management 12, 137–144 (2004). https://doi.org/10.1023/B:JONS.0000015702.05980.d2

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:JONS.0000015702.05980.d2

Keywords

Navigation