1 |
Hyun-Mi Jung, Kyung-Su Han and Gang-Soo Lee ," A Schema Design for Supporting The Cyber Security Control of SCADA ," Journal of Korea Knowledge Information Technology, vol 7, No 6, 2012
|
2 |
The Nuclear Regulatory Commission, http://nrcstp.ornl.gov/slo/regguide571.pdf
|
3 |
Cyber security programs for nuclear facilities; Regulatory Guide 5.71, U.S. Nuclear Regulatory Commission , 2010
|
4 |
Hyun-Mi Jung , Kyung-Su Han, Gang-Soo Lee and Su-Jin Jang "A role-based access analysis for the cyber security management," Journal of Future Game Technology (JFGT), vol. 2, No. 1, 2012
|
5 |
2004 The White Paper of National Information Security, http://www.nist.go.kr
|
6 |
Ron Derynck , "Cyber-Security and System Integrity for Transportation Networks," VeronoWhitepaper, 2004
|
7 |
Sylvia Osborn, Ravi Sandhu, Qamar Munawer, " Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Transactions on Information and System Security, vol. 3, No. 2, Pages 85-106, 2000
DOI
|
8 |
National Institute of Standards and Technology , http://hissa.nist.gov/prject/rbac.html
|
9 |
http://www.ecs.syr.edu/chin/cse774/readings/rbac/p34-ferraio.pdf
|
10 |
National Institute of Standards and Technology , http://csrc.nist.go.kr/rbac
|
11 |
http://en.wikipedia.org/wiki/Role-based_access_control
|