Industrial Internet Security Framework v 1.0 | Page 167

Security Framework Annex G: References [Saltzer1974] Saltzer, Jerome H and Schroeder, Michael D.: The Protection of Information in Computer Systems. Manuscript received October 11, 1974; revised April 17. 1975. Fourth ACM Symposium on Operating System Principles (October 1973). Revised version in Communications of the ACM 17, 7 (July 1974) , retrieved 2016-09-26. http://www.cs.virginia.edu/~evans/cs551/saltzer/ [SANS-SSCS] Escal Institute of Advanced Technologies (SANS Institute): The State of Security in Control Systems Today, 2015-June, retrieved 2016-09-26 http://www.sans.org/reading-room/whitepapers/analyst/state-securitycontrol-systems-today-36042 [SarOxl] Sarbanes-Oxley Act, U.S. Securities and Exchange Commission, 2002, retrieved 2016-09-26 https://www.sec.gov/about/laws.shtml#sox2002 [Schneider1998] Schneider, Fred B. (Editor), Committee on Information Systems: Trustworthiness: Trust in Cyberspace, National Academic Press, Washington D.C., 1999, retrieved 2016-09-26 http://www.nap.edu/catalog/6161/trust-in-cyberspace [SGIP-CoS] Smart Grid Interoperability Panel (SGIP): Catalog of Standards (CoS), retrieved 2016-09-26 http://www.sgip.org/wp-content/uploads/SGIPs_Catalog_of_Standards.pdf from http://www.sgip.org/catalog-of-standards/ [SNL2005] Framework for SCADA Security Policy, Sandia National Laboratories, 2015, retrieved 2016-09-26 http://energy.gov/sites/prod/files/Framework%20for%20SCADA%20Security %20Policy.pdf [Sym-ECC] Symantec Corporation: Elliptic Curve Cryptography (ECC), Certificates Performance Analysis, whitepaper, May 2013, retrieved 2016-09-02 https://www.symantec.com/content/en/us/enterprise/white_papers/bwp_ecc.pdf [TCG] Trusted Computing Group (TCG), retrieved 2016-09-02 http://www.trustedcomputinggroup.org [TCG-AG-ICS] Trusted Computing Group (TCG): Architects Guide: ICS Security Using TNC Technology, retrieved 2016-09-05 http://www.trustedcomputinggroup.org/wp-content/uploads/ICS-SecurityUsing-TNC-Technology-Architects-Guide.pdf from http://www.trustedcomputinggroup.org/architects-guide-ics-security-usingtnc-technology/ IIC:PUB:G4:V1.0:PB:20160926 - 167 -