References
- Wang Changkun, 'Policy-based Network Management,' Communication Technology Proceeding, WCC-ICCT 2000, International Conference on, Vol.1(Aug. 2000), pp.101-105
- Verma, D. C., 'Simplifying Network Administration Using Policy-based Management,' Network, IEEE, Vol.16(March-April 2002), pp.20-26
- B. P. Zeigler, 'Object-Oriented Simulation with Hierarchical,' Modular Models, USA:Academic Press, San Diego CA, 1990
- Seo, Hee Suk , Cho, Tae Ho and Chi, Sung Do, 'Modeling and Simulation of Distributed Security Models,' Lecture Notes on Computer Science, Springer Verlag, LNCS 2660, (Jun. 2003), pp.809-818
- NIST, An Introduction to Computer Security:The NIST Handbook, Technology Adminstration, U.S.A, 1995
- M. Bishop, 'Vulnerablities Analysis,' Proceedings of the Recent Advances in Intrusion Detection, (Sep. 1999), pp.125-136
- Robert A. Martin, 'Managing Vulnerabilities in Networked Systems,' IEEE Computer, Vol.34, No.11(Nov. 2001), pp.32-38 https://doi.org/10.1109/2.963441
- M. Stevens. 'Policy Framework,' Internet Draft, draft-ietf-policy-framework-05.txt, Sep. 1999
- B. Moore, et al., 'Policy Core Information Model-Version 1 Specification,' IETF RFC 3060, Feb. 2000
- B. Moore, et al., 'Policy Core Information Model (PCIM) Extensions,' IETF RFC 3460, Jan. 2003
- http://icat.nist.gov, ICAT Metabase
- R. Bace, Intrusion Detection, Macmillan Technical Publishing, 2000
- E. D. Zwicky, S. Cooper and D. B. Chapman, Building Internet Firewalls, second edition, O’reilly & Associates, 2000
- Zhengxin Chen, John Wiley & Sons, Data Mining And Uncertain Reasoning:An Integrated Approach, 2001
- http://icat.nist.gov/icat.cfm?cvename=CVE-2000-0305