Browse > Article

정보통신 인프라 정보보호 제어 프레임워크 연구  

Na, Jung-Chan (한국전자통신연구원 정보보호연구단)
Kim, Jin-O (한국전자통신연구원 정보보호연구단)
Son, Seon-Gyeong (한국전자통신연구원 정보보호연구단)
Jang, Jong-Su (한국전자통신연구원 정보보호연구단)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 G, Smith and R Newton, 'A Taxonamy of Organizational Security PoIicies,' Proceedings of the 23rd National Information Systems Security Conference, Baltimore, Maryland, Oct 2000, http://csrc.nist.gov/nissc/2000/proceedings/toc.html (current 24 November 2001)
2 DMTF, 'Desktop Management Interface (DMI) Specification version 2.0,' http://www.dmtf.org/standards/documents/DMI/DSP0001.pdf, June 24, 1998
3 DMTF, 'Specification for the Representation of CIM in XML Version 2.0,' http://www.dmtf.org/standards/documents/WBEM/CIM_XML_Mapping20.html, June 2nd, 1999
4 B. More, E. Ellesson, J. Strassner, and A. Westerinen, 'Policy Core Information Model - Version 1 Specification,' RFC 3060, IETF, Feb. 2001
5 B. More, 'PoIicy Core Infomation Model (PCIM) Extensions,' RFC 3460, IETF, Jan. 2003
6 ETSI, 'Open Service Access; Application Programming Interface; Part 13: Policy management SCF,' ETSI ES 202 915-13 Vl.1.1, http://www.parlay.org/specs/index.asp, Jan. 2003
7 J. Strassner, B. Moore, R. Moats, and E. Ellesson, 'Policy Core Lishtweieht Directory Access Protocol (LDAP) Schema,' RFC 3703, IETF, Feb. 2004
8 K. Chan, J. Seligson, D. Durham, S. Gai, K. McCloghrie, S. Herzog, F. Reichmeyer, R. Vavatkar, and A. Smith, 'COPS Usage for PoIicy Provisioning (COPS-PR),' RFC3084, IETF, March, 2001
9 J. Jason, L. Rafalow, and E. Vyncke, 'IPsec Configuration Policy Information Model,' RFC 3585, IETF, Aug 2003
10 Christopher M. King, et al, 'Directory Enabled Network (DEN),' Macmillan Technical Publishing, 2001
11 Y. Snir, Y. Ramberg, J. Strassner, R. Cohen, and B. Moore, 'PoIicy Quality of Service (QoS) Information Model,' RFC 3644, IETF, Nov. 2003
12 B. Moore, D. Durham, J. Strassner, A. Westerinen, and W. Weiss, 'Information ModeI for Describing Network Device QoS Datapath Mechanisms,' RFC 3670, IETF, Jan. 2004
13 D. Durham, J. Boyle, R. Cohel, S. Herzog, R. Rajan, and A. Sastry, 'The COPS(Common Open Policy Service) Protocol', RFC2748, IETF, January, 2001
14 OPSEC, Build Your Security Infrastructure With Best-of-Breed Products From OPSEC,' OPSEC White Paper, 2004
15 NIST, NIST Computer Security Special Publications http://csrc.nist.gov/publications/ nistpubs/index.html
16 DMTF, 'Web-Based Enterprise Management,' http://www.dmtf.orgstand ards/wbem
17 SANS, The SANS Security PoIicy Project, www.sans.org/newlook/resources/Policies/Policies.htm
18 Georgia Institute of Technology, 'Computer and Network Usage Policy,' http://adminguide. stanford.edu/62.pdf, June 2004
19 DMTF, 'Policy Version 2.9 CIM Specification,' http://www.dmtf.org, 2004
20 K. McCloghrie, M. Fine, J. Seligson, K. Chan, S. Hahn, R. Sahita, A. Smith, and F. Reichmeyer, 'Structure of PoIicy Provisioning Information(SPPI),' RFC 3159, IETF, Aug. 2001
21 B. Fraser, 'Site Security Handbook,' RFC 2196, IETF, Sep. 1997