Author:
Ki-Yoong Hong,P.E. ,Kim Chul
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. D. E. Bell, “Security Policy Modeling for the Next-Generation Packet Switch,” Proceedings of 1988 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, pp. 212–216, May 1988.
2. J. Landauer, C. Heitmeyer, and J. McLean, “A SecurityModel for Military Message Systems,” ACM Trans. on Computer Systems, Vol. 2, No. 3, pp. 198–222, Aug. 1984.
3. CCITT, Data Communication Networks Message Handling Systems, CCITT Recommendations, X.400-X.420, Nov. 1988.
4. CCITT, Data Communication Networks Directory Recommendations, X.509, Nov. 1988.
5. Charles Dinkel, “SDNS Network, Transport, and Message Security Protocols,” NISTIR 90-44250, U.S. DoC NIST, Gaithersburg, MD, Feb. 1990.