1 |
William R. Cheswick, Steven M. Bellovm Firewalls and Internet Security: Repelling the Willy hacker, Addison Wesley, 1994
|
2 |
J. G. Ko, J. N. Kim, & K. I. Jeong. "Access Control for Secure Free BSD Operating System," Proc.of WISA2001, The Second International Workshop on Information Security Applications, 2001.
|
3 |
Peter A. Loscocco, Wtephen D. Dmalley, Patric A. Muckelbauer Ruth C, Taylor, S. Jeff Truner, John F. Farrel. 'The Inevitability of Failure : The Flawed Assumption of Security in Modern Computing Environments', National Security Agency,1997.
|
4 |
DoD 5200.28-STD. 'Department of Defense Trusted Computer System Evaluation Criteria', December 1985
|
5 |
Dorothy E, Denning, 'Information Warfare and Security, Addisonwesley, April 1999.
|
6 |
S.H. Jo, J. N. Kim. & S. W. Sohn, "Design of Web-based Security Management for Intrusion Detection" Proc. of ICEB, ICEB '2002, 2002
|
7 |
Linux 2.4.18 Kernel-RELEASE Source Code
|
8 |
Chris Hare, Karanjit Siyan, Internet Firewalls and Network Security 2nd ed., New Readers, 1996.
|
9 |
B. H. Jung, J. N. Kim, 'Design of Dynamic Intrusion Detection Rule Modification Technique for Kernel Level Intrusion Detection.' 한국정보처리학회 추계학술대회 논문집, Vol. 9. No2, Nov. 2002
|
10 |
David F. Ferraiolo, Ravi Sandu, & Serban Gavrila, "A Proposed Standard for Role-Based Access Control," ACM transaction on Information and System Security, VOL.4, NO.3, pp.224-274 Aue 2001
DOI
|
11 |
An Introduction to Computer Security : The NIST Handbook, NIST Special Publication 800-12January 1
|
12 |
D. Brent Chapman, Elizabeth D. Zwicky, Building Internet Firewalls. O Reilly & Associations, Inc. January1996.
|
13 |
D. Ferraolo and R. Kuhn, 'Role-Based Access Control', Proceeding of the 15th National Computer Security Conference, 1992
|