参考文献
|
-
樊國楨、黃健誠、朱潮昌(2013)。資訊安全管理與脆弱性評分系統初探。電腦稽核,27,79-101。
連結:
-
(2011).DoD/IC SOA Security Reference Architecture: IAnewsletter,14(3)
-
Enders, R. and H. Schwarz, (2013) Network Endpoints and Attribute Based Access Controls, May 2013 Whitepaper and Presentation Submissions ICS-CERT (Industrial Control Systems Cyber Emergency Response Team) (http://www.ics-cert.us-cert.gov/(2013-10-19 檢索)。
-
吳啟文(2013)政府資通安全威脅趨勢及防護策略(簡報資料),第23屆全國資訊安全會議,2013-05-23(A.M.09:15~10:05)。
-
http://nvd.nist.gov/(2013-10-19檢索)
-
Sherstobitoff, R., I. Liba and J. Walter (2013) Dissecting Operation Troy Cyberspionage in South Korea, McAfee, 2013-03-20.
-
Hu, C. V. et al. (2014) Guide to Attribute Based Access Control (ABAC) Definition and Considerations NIST Special Publication 800-162,Figure 5, Page 15, Jan. 2014.
-
Regenscheid, A. and K. Scarfone (2011) BIOS Integrity Measurement Guidelines (Draft), NIST Special Publication 800-155 (Draft), December 2011.
-
Andresen, Leslie(2011).Trusted Computing Based Insider Threat Protection.2nd Annal NSA Trusted Computing Conference & Exposition
-
Booth, H.,Halbardier, A.(2011).NIST Intergency Report 7802NIST Intergency Report 7802,未出版
-
Cooper, D.(2011).BIOS Protection Guidelines.NIST.
-
Coyne, E.J.,Weil, T.R.(2013).ABAC and RBAC: Scalable, Flexible, and Auditable Access Management.IEEE IT Professional,2013(May/June)
-
Kuhn, D.R.,Coyne, E.J.,Weil, T.R.(2010).Adding Attributes to Role Based Access Control.IEEE Computer,2010(June),79-81.
-
Unal, D.,Caglayan, M.U.(2013).A formal role-based access control model for security policies in multi-domain mobile networks.Computer Networks,57(1),300-350.
-
樊國楨、黃健誠(2013)。下一世代網路(Next Generation Network,簡稱NGN)安全標準初探之三:可信賴網路接取(Trusted Network Connect,簡稱TNC)。網路通訊國家型科技計畫簡訊,54,38-47。
|