[1]José M C, Juan B P, José M M, et al. Advances in Air Navigation Services[M]. Croatia: Mirna Cvijic Press, 2012[2]马兰, 吴志军. 空中交通管理信息安全评估[M]. 北京: 科学出版社, 2015[3]环球网. 波兰民航被“黑”启示录: 越来越多黑客指向航空[EBOL]. [20150622]. http:world.huanqiu.comarticle2015066741616.html[4]光明网. 欧洲13架飞机从雷达上消失25分钟疑遭黑客攻击[EBOL]. [20140616]. http:world.gmw.cn20140616content_11623851.htm[5]International Civil Aviation Organization. Web service security standards[COL] Aeronautical Telecommunication Network (ATN) Implementation Coordination Group—Eighth Working Group Meeting. 2010 [20160218]. http:www.icao.intAPACMeetings2010atnicg_wg8wp12.pdf[6]Marshall A. Overall security concept[C] Proc of the ICAO ATNP Security Working Group—ATN Panel Working Group 1. Piscataway, NJ: IEEE, 1996[7]Arthur Pyster. A systems approach to protecting the US air traffic control system against cyberterrorism[EBOL]. [20140415]. http:docplayer.net5184797Asystemsapproachtoprotectingtheusairtrafficcontrolsystemagainstcyberterrorism.html[8]Daniel J Mehan. Information systems security[R]. Washington: Federal Aviation Administrations Layered Approach, 2000[9]Kauffman D C. Data link security for airline operational communications and air traffic services—An opportunity for synergistic efforts[C] Proc of Int Conf on Integrated Communication Navigation Surveillance. Washington: NASA Glenn Research Center Space Communications Program, 2003[10]Federal Aviation Administration. System Wide Information Management (SWIM) eXtensible Markup Language (XML) Gateway Requirements, Version 2.0 [S]. Washington: Federal Aviation Administration (FAA), 2009[11]Standley J, Brown V, Comitz P, et al. SWIM segment 2 deployment and utlitization in NextGen R&D programs[C] Proc of Integrated Communications, Navigation and Surveillance Conf (ICNS 2012). Piscataway, NJ: IEEE, 2012: G81G85[12]Federal Aviation Administration. FAA Cloud Computing Strategy, FinalVersion 1.0[S]. Washington: Federal Aviation Administration (FAA), 2012[13]Bob Stephens. Security architecture for system wide information management[C] Proc of the 24th Digital Avionics Systems Conf (DASC 2005). Piscataway, NJ: IEEE, 2005[14]Bob Stephens. Systemwide information management (SWIM) demonstration security architecture[C] Proc of the 25th IEEEAIAA Digital Avionics Systems Conf. Piscataway, NJ: IEEE, 2006: 112[15]Ramakrishnan V, Wargo C, John S. GMPLS network security: Gap analysis[C] Proc of Integrated Communications, Navigation and Surveillance Conf (ICNS 2008). Piscataway, NJ: IEEE, 2008: 17[16]Luckenbaugh G, Landriau S, Dehn J, et al. Service oriented architecture for the next generation air transportation system[C] Proc of Integrated Communications, Navigation and Surveillance Conf (ICNS07). Piscataway, NJ: IEEE, 2007: 19[17]Lai Junzuo, Deng R H, Guan Chaowen, et al. Attributebased encryption with verifiable outsourced decryption[J]. IEEE Trans on Information Forensics and Security, 2013, 8(8): 13431354 |