References
- Security Policy Project SANS
- Site Security Handbook, SEI/CMU B.Fraser(ed.)
- A Introduction to Computer Security : The NIST Handbook NIST
- ISO/IEC TR 13335-1,2,3, IT 보안 개념 및 모델, IT 보안 관리 및 계획, IT 보안 관리 기법
- Information Technology Security Evaluation Criteria(ITSEM)(Ver.1.0) European Community
- IT 보안 해설서, Boran Consulting Sean Boran;이혜련(번역)
- Site Security Policy Development R.Macmillan
- Developing an Information Security Polic Alan Robiette
- Information Security Policy Kingston University
- Electronic Information Systems: Security Policy Lancaster University
- University Rules for Computer Use Oxford University
- Policies and Procedures Computer Use Policy Washington University
- Policies and Procedures, Information Security Policy
- CCMB-99-031 Common Criteria for Information Technology Securtiy Evaluation, Version 2.1 CC
- CEM-99/045 Common Evaluation Methodology, Version 1,0 CC
- ISO/IEC PDTR 15446 Information technology - Security techniques - Guide for the production of protection profiles and security targets
- DBMS Protection Profile Oracle
- Traffic Filter Firewall Protection Profile For Medium Robustbess Environments NSA
- Traffic Filter Firewall Protection Profile for Low Risk Environments NSA
- Application Level Firewall Protection Profile for Low Risk Environments NSA
- Peer-to-Peer Wieless Local Area Network (WLAN) for Sensitive But Unclassified Environments BHTT
- Protection Profile for Switches and Routers NSA
- A Goal VPN Protection Profile For Protecting Sensitive Information(V2.0) NSA
- Infrastructure Wireless Local Area Network (WLAN) BHTT
- Labeled Security Protection Profile NSA
- Controlled Access Protection Profile NSA
- Protection Profile for Multileval OS NSA
- Protection Profile for Single-level OS's in Environments Requiring Medium PP NSA
- Directory for DoD Class 4 PKI PP NSA
- Trusted Platform Module(TPM) PP TCPA
- Certificate Issuing and Management Components NSA
- Role-Based Access Control PP NIST
- Privilege Directed Content PP Authorizor
- Key Recovery for Third Party Requestors NSA
- Key Recovery for Agent Systems NSA
- Key Recovery for End Systems NSA
- Role-Based Access Control PP NIST
- Intrusion Detection System Analyzer -Draft 3 NSA
- Intrusion Detection System Sensor NSA
- Smart Card Protection Profile SCSUG
- Postage Meter Approval Protection Profile Consignia
- Biometric System. Protection Profile For Medium Robustness Environments DoD Biometrics Management Office1. U.S. Department of Defense Biometrics Office
- CC Toolbox Reference Manua(Version 6.0f) NIAP
- CC Profiling Knowledge base Report List of Threat, Attack, Policy, Assumption, and Environment Statement Attribute NIAP