Browse > Article

트러스트 기반의 신뢰 네트워크 구조  

Jeon, U-Jik (한국외국어대학교)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Feldman, Internet Clean-Slate Design: What and Why?, ACM SIGCOMM Computer Communications Review, Vol. 37, No. 3, July 2007, pp. 59-64   DOI
2 J.Day, Patterns in Network Architecture: A Return to Fundamentals. Prentice Hall, 2008.
3 박용규, 사이버대피소를 통해 본 '12년도 DDoS 공격동향 분석, KISA, Internet & Security Focus 2013 2월호
4 ISO/IEC 27000:2009 (E). (2009). Information technology - Security techniques - Information security management systems - Overview and vocabulary. ISO/IEC.
5 R. Thayer, N. Doraswamy and R. Glenn, IP Security Document Roadmap, IETF RFC 2411
6 K. Egevang, P. Francis, The IP Network Address Translator (NAT), IETF RFC 1631
7 Mirkovic, Jelena, and Peter Reiher. "Building accountability into the future Internet." Secure Network Protocols, 2008. NPSec 2008. 4th Workshop on. IEEE, 2008.
8 Andersen, David G., et al. "Accountable internet protocol (AIP)." ACM SIGCOMM Computer Communication Review. Vol. 38. No. 4. ACM, 2008.
9 Zhang, Xin, et al. "SCION: Scalability, control, and isolation on next-generation networks." Security and Privacy (SP), 2011 IEEE Symposium on. IEEE, 2011
10 Bonatti, Piero, et al. "An integration of reputation-based and policy-based trust management." networks 2.14 (2007)
11 M. Blaze, J. Feigenbaum, and J.Lacy. Decentralized trust management. In Proceedings of IEEE Conference on Security and Privacy, 1996
12 P. A. Bonatti and D. Olmedilla. Driving and monitoring provisional trust negotiation with metapolicies. In IEEE 6th International Workshop on Policies for Distributed Systems and Networks (POLICY), pages 14-23, Stockholm, Sweden, jun 2005. IEEE Computer Society.
13 S. Marsh. Formalizing Trust as a Computational Concept. PhD thesis, Uni. of Stirling, 1994.
14 N. Li and J. Mitchell. RT: A Role-based Trust-management Framework. In DARPA Information Survivability Conference and Exposition (DISCEX), Washington, D.C., Apr. 2003