1 |
CISA Cybersecurity division, "Zero trust maturity level," Pre-decisional Draft, version1.0, June 2021.
|
2 |
Juanita Koilpillai, "Software Defined Perimeter-A New Paradigm for Securing Digital Infrastructures/Systems," GTSC 2017, Aug.
|
3 |
Brent Bilger, Alan Boehme, et al., "SDP Specification 1.0," CSA, April, 2014
|
4 |
Jason Garbis, Juanita Koilpillai, "Software-Defined Perimeter Architecture Guide," CSA, 2019.
|
5 |
Yoon Hong, "A method for detecing phishing/pharming attacks using SSL/TLS protocols," Journal of Defense and Security, vol.1, no.2, pp. 118-134, Dec. 2019.
|
6 |
Scott Rose, O.Borchert, S. Mitchell, and S. Connelly, "Zero Trust Architecture," NIST.SP.800-207, Aug. 2020.
|
7 |
Ji Yeon Yang, Hyoung Kee Choi, "A Study on the Certificate Verification Testing in SSL/TLS Implementations," KICS Summer Conference 2017.pp.138-139, 2017.
|
8 |
Jason Garbis, Juanita Koilpillai, "Software Defined Perimeter(SDP) Specification v2.0," CSA, Mar. 2022
|