Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques
暂无分享,去创建一个
[1] Gregory A. Witte,et al. Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP (1st) , 2012 .
[2] Abhay Bhargav. Payment Card Industry Data Security Standard (PCI-DSS) , 2014 .
[3] Marianne M. Swanson,et al. Recommended Security Controls for Federal Information Systems , 2005 .
[4] Karen A. Scarfone,et al. The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities , 2010 .
[5] Joint Task Force. Recommended Security Controls for Federal Information Systems and Organizations , 2009 .
[6] Harold Booth,et al. Trust Model for Security Automation Data 1.0 (TMSAD) , 2011 .
[7] Sergey Bratus,et al. TOCTOU, Traps, and Trusted Computing , 2008, TRUST.
[8] Neal Ziring,et al. Specification for the Extensible Configuration Checklist Description Format (XCCDF) , 2005 .
[9] Leendert van Doorn. Trusted computing challenges , 2007, STC '07.
[10] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[11] James E. Smith,et al. Virtual machines - versatile platforms for systems and processes , 2005 .
[12] Karen A. Scarfone,et al. The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems , 2007 .
[13] Leendert van Doorn,et al. A Practical Guide to Trusted Computing , 2007 .
[14] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[15] Karen A. Scarfone,et al. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2 , 2009 .
[16] Xin Huang,et al. An Effective Approach for Remote Attestation in Trusted Computing , 2009 .
[17] Karen A. Scarfone,et al. Common Platform Enumeration: Naming Specification Version 2.3 , 2011 .