Industrial Internet Security Framework v 1.0 | Page 167
Security Framework
Annex G: References
[Saltzer1974]
Saltzer, Jerome H and Schroeder, Michael D.: The Protection of Information
in Computer Systems. Manuscript received October 11, 1974; revised April
17. 1975. Fourth ACM Symposium on Operating System Principles (October
1973). Revised version in Communications of the ACM 17, 7 (July 1974) ,
retrieved 2016-09-26.
http://www.cs.virginia.edu/~evans/cs551/saltzer/
[SANS-SSCS]
Escal Institute of Advanced Technologies (SANS Institute): The State of
Security in Control Systems Today, 2015-June, retrieved 2016-09-26
http://www.sans.org/reading-room/whitepapers/analyst/state-securitycontrol-systems-today-36042
[SarOxl]
Sarbanes-Oxley Act, U.S. Securities and Exchange Commission, 2002,
retrieved 2016-09-26
https://www.sec.gov/about/laws.shtml#sox2002
[Schneider1998] Schneider, Fred B. (Editor), Committee on Information Systems:
Trustworthiness: Trust in Cyberspace, National Academic Press, Washington
D.C., 1999, retrieved 2016-09-26
http://www.nap.edu/catalog/6161/trust-in-cyberspace
[SGIP-CoS]
Smart Grid Interoperability Panel (SGIP): Catalog of Standards (CoS),
retrieved 2016-09-26
http://www.sgip.org/wp-content/uploads/SGIPs_Catalog_of_Standards.pdf
from
http://www.sgip.org/catalog-of-standards/
[SNL2005]
Framework for SCADA Security Policy, Sandia National Laboratories, 2015,
retrieved 2016-09-26
http://energy.gov/sites/prod/files/Framework%20for%20SCADA%20Security
%20Policy.pdf
[Sym-ECC]
Symantec Corporation: Elliptic Curve Cryptography (ECC), Certificates
Performance Analysis, whitepaper, May 2013, retrieved 2016-09-02
https://www.symantec.com/content/en/us/enterprise/white_papers/bwp_ecc.pdf
[TCG]
Trusted Computing Group (TCG), retrieved 2016-09-02
http://www.trustedcomputinggroup.org
[TCG-AG-ICS]
Trusted Computing Group (TCG): Architects Guide: ICS Security Using TNC
Technology, retrieved 2016-09-05
http://www.trustedcomputinggroup.org/wp-content/uploads/ICS-SecurityUsing-TNC-Technology-Architects-Guide.pdf
from
http://www.trustedcomputinggroup.org/architects-guide-ics-security-usingtnc-technology/
IIC:PUB:G4:V1.0:PB:20160926
- 167 -