Using Trust on the Internet
暂无分享,去创建一个
[1] John Linn,et al. Generic Security Service Application Program Interface, Version 2 , 1997, RFC.
[2] Marshall T. Rose,et al. Guidelines for the Use of Extensible Markup Language (XML) within IETF Protocols , 2003, RFC.
[3] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[4] Robert W. Shirey,et al. Internet Security Glossary, Version 2 , 2007, RFC.
[5] Ravi S. Sandhu. Good-Enough Security: Toward a Pragmatic Business-Driven Discipline , 2003, IEEE Internet Comput..
[6] Roni Even,et al. RTP Payload Format for ITU-T Recommendation G.722.1 , 2001, RFC.
[7] John Linn,et al. Generic Security Service Application Program Interface Version 2, Update 1 , 2000, RFC.
[8] Robert W. Shirey,et al. Internet Security Glossary , 2000, RFC.
[9] Gregory A. Matthews,et al. The Intrusion Detection Exchange Protocol (IDXP) , 2007, RFC.
[10] David Clark,et al. New ARCH: Future Generation Internet Architecture , 2004 .