정보통신 인프라 정보보호 제어 프레임워크 연구

  • 나중찬 (한국전자통신연구원 정보보호연구단) ;
  • 김진오 (한국전자통신연구원 정보보호연구단) ;
  • 손선경 (한국전자통신연구원 정보보호연구단) ;
  • 장종수 (한국전자통신연구원 정보보호연구단)
  • Published : 2004.09.01

Abstract

Keywords

References

  1. NIST, NIST Computer Security Special Publications http://csrc.nist.gov/publications/ nistpubs/index.html
  2. G, Smith and R Newton, 'A Taxonamy of Organizational Security PoIicies,' Proceedings of the 23rd National Information Systems Security Conference, Baltimore, Maryland, Oct 2000, http://csrc.nist.gov/nissc/2000/proceedings/toc.html (current 24 November 2001)
  3. SANS, The SANS Security PoIicy Project, www.sans.org/newlook/resources/Policies/Policies.htm
  4. Georgia Institute of Technology, 'Computer and Network Usage Policy,' http://adminguide. stanford.edu/62.pdf, June 2004
  5. B. Fraser, 'Site Security Handbook,' RFC 2196, IETF, Sep. 1997
  6. DMTF, 'Policy Version 2.9 CIM Specification,' http://www.dmtf.org, 2004
  7. DMTF, 'Desktop Management Interface (DMI) Specification version 2.0,' http://www.dmtf.org/standards/documents/DMI/DSP0001.pdf, June 24, 1998
  8. Christopher M. King, et al, 'Directory Enabled Network (DEN),' Macmillan Technical Publishing, 2001
  9. DMTF, 'Web-Based Enterprise Management,' http://www.dmtf.orgstand ards/wbem
  10. DMTF, 'Specification for the Representation of CIM in XML Version 2.0,' http://www.dmtf.org/standards/documents/WBEM/CIM_XML_Mapping20.html, June 2nd, 1999
  11. B. More, E. Ellesson, J. Strassner, and A. Westerinen, 'Policy Core Information Model - Version 1 Specification,' RFC 3060, IETF, Feb. 2001
  12. B. More, 'PoIicy Core Infomation Model (PCIM) Extensions,' RFC 3460, IETF, Jan. 2003
  13. J. Jason, L. Rafalow, and E. Vyncke, 'IPsec Configuration Policy Information Model,' RFC 3585, IETF, Aug 2003
  14. Y. Snir, Y. Ramberg, J. Strassner, R. Cohen, and B. Moore, 'PoIicy Quality of Service (QoS) Information Model,' RFC 3644, IETF, Nov. 2003
  15. B. Moore, D. Durham, J. Strassner, A. Westerinen, and W. Weiss, 'Information ModeI for Describing Network Device QoS Datapath Mechanisms,' RFC 3670, IETF, Jan. 2004
  16. ETSI, 'Open Service Access; Application Programming Interface; Part 13: Policy management SCF,' ETSI ES 202 915-13 Vl.1.1, http://www.parlay.org/specs/index.asp, Jan. 2003
  17. K. McCloghrie, M. Fine, J. Seligson, K. Chan, S. Hahn, R. Sahita, A. Smith, and F. Reichmeyer, 'Structure of PoIicy Provisioning Information(SPPI),' RFC 3159, IETF, Aug. 2001
  18. J. Strassner, B. Moore, R. Moats, and E. Ellesson, 'Policy Core Lishtweieht Directory Access Protocol (LDAP) Schema,' RFC 3703, IETF, Feb. 2004
  19. D. Durham, J. Boyle, R. Cohel, S. Herzog, R. Rajan, and A. Sastry, 'The COPS(Common Open Policy Service) Protocol', RFC2748, IETF, January, 2001
  20. K. Chan, J. Seligson, D. Durham, S. Gai, K. McCloghrie, S. Herzog, F. Reichmeyer, R. Vavatkar, and A. Smith, 'COPS Usage for PoIicy Provisioning (COPS-PR),' RFC3084, IETF, March, 2001
  21. OPSEC, Build Your Security Infrastructure With Best-of-Breed Products From OPSEC,' OPSEC White Paper, 2004