References
- ITU-T SG17 TD1420, "Report of Q.4/17"
- ITU-T SG17 TD1161 Rev.6, "Recommendation ITU-T X.1500 Cybersecurity information exchange techniques"
- ITU-T SG17 TD1162 Rev.2. "Draft New Rec. ITU-T X.1520, Common vulnerabilities and exposures for determination"
- ITU-T SG17 TD1177 Rev.2. "Draft New Rec. ITU-T X.1521, Common vulnerability scoring system for determination"
- ITU-T SG17 TD1482, "Tutorial Presentation on Application of CYBEX (Cybersecurity Information Exchange) techniques to future networks"
- ITU-T SG17 TD1404, "Recommendation Summaries Q.4/17"
- Recommendaton ITU-T X.1205, "Overview of cybersecurity"
- Recommendaton ITU-T X.1206, "A vendor-neutral framework for automatic notification of security related information and dissemination of updates"
- Recommendation ITU-T X.1207, "Guidelines for telecommunication service providers for addressing the risk of spyware and potentially unwanted software"
- Recommendation ITU-T X.1209, "Capabilities and their context scenarios for cybersecurity information sharing and exchange"
- Recommendation ITU-T X.1205 supplement 8, "Supplement on best practices against botnet threats"
- Tony Rutkowski, "Application of CYBEX techniques to future networks," SG17 Tutorial.
- 김미주, "글로벌 사이버보안 정보교류 국제표준화 동향," TTA ICT Standard Weekly 2009-46호.
- MITRE, Assessment Results Format.
- MITRE, Common Attack Pattern Enumeration and Classification
- MITRE, Common Configuration Enumeration
- MITRE, Common Event Expression
- MITRE, Common Platform Enumeration
- MITRE, Common Weakness Enumeration
- MITRE, Common Weakness Scoring System.
- Electronic Authentication Guideline, NIST Special Publication 800-63 Version 1.0.2, April 2006
- CA/Browser Forum, Guidelines for the Issuance and Management of Extended Validation Certificates, Ver. 1.3
- Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates, ETSI TS102042.
- IETF RFC 3080, The Blocks Extensible Exchange Protocol Core
- IETF RFC 5070, Incident Object Description Exchange Format
- IETF RFC 5901, Extensions to the IODEF-Document Class for Reporting Phishing
- IETF RFC 6046, Transport of Real-time Internetwork Defense (RID) Messages
- MITRE, Malware Attribute Enumeration and Characterization
- MITRE, Open Vulnerability and Assessment Language
- W3C, Simple Object Access Protocol
- Traffic Light Protocol. Information Sharing Levels, CPNI Information Exchange, UK CPNI (April 2010)
- Trusted Computing Group, Trusted Network Connect
- Trusted Computing Group, Trusted Platform Modules
- NIST, The eXtensible Configuration Checklist Description Format