[1]杨震, 田永春, 范国林, 等. 美军零信任安全发展现状研究[J]. 信息安全与通信保密, 2024 (3): 112[2]National Research Council. Computers at Risk: Safe Computing in the Information Age[M]. Washington, DC: National Academies Press, 1988[3]National Security Agency. Information assurance technical framework (IATF) release 3.1[R]. Maryland: National Security Agency, 2002[4]Denning D E. Cryptography and Data Security[M]. Reading, MA: AddisonWesley, 1982[5]Chen P, Desmet L, Huygens C. A study on advanced persistent threats[C] Proc of IFIP Int Conf on Communications and Multimedia Security. Berlin: Springer, 2014: 6372[6]Ghafir I, Prenosil V, Hammoudeh M, et al. BotDet: A system for realtime botnet command and control traffic detection [J]. IEEE Access, 2018, 6: 3894738958[7]冯登国. 准确把握网络空间安全技术发展的新特征 全力助推国家安全体系和能力现代化 [J]. 中国科学院院刊, 2022, 37(11): 15391542[8]Ross R, Graubart R, Bodeau D, et al. Systems security engineering: Cyber resiliency considerations for the engineering of trustworthy secure systems (NIST Special Publication 800~160, Volume 2)[R]. Gaithersburg: National Institute of Standards and Technology, 2019[9]邬江兴, 邹宏, 薛向阳, 等. 内生安全赋能网络弹性的构想、方法与策略 [J]. 中国工程科学, 2023, 25(6): 106115[10]Yuill J, Wu S F, Gong F, et al. Intrusion detection for an ongoing attack[C] Proc of RAID’99. Berlin: Springer, 1999[11]曾梦岐, 石凯. 基于动态信任的内生安全架构 [J]. 通信技术, 2022, 55(8): 10361043[12]OpenID Community. OpenID authentication 2.0[EBOL]. (20071205) [20244015]. http:openid.netspecsopenidauthentication2_0.html[13]Internet Engineering Task Force (IETF). The OAuth 2.0 authorization framework[EBOL]. 202110 [20240415]. http:tools.ietf.orghtmlrfc6749[14]吕尧, 孟雪. 网络可信身份服务行业发展分析 [J]. 网络空间安全, 2020, 11(11): 2028[15]张泽洲, 王鹏. 零信任安全架构研究综述 [J]. 保密科学技术, 2021 (8): 816[16]张宇, 张妍. 零信任研究综述 [J]. 信息安全研究, 2020, 6(7): 608614[17]黄杰, 何城鋆. 基于软件定义边界的服务保护方案 [J]. 信息网络安全, 2023, 23(6): 110 |