References
- 정보통신부 BcN 구축 기본 계획(2. 통합망 보안기능 고도화), pp. 76-83, 2004년 2월, 한국전산원
- Allan J. Albrecht, Measuring application development, In Proc. of IBM Applications Development Joint SHARE/GUIDE Symposium, pp83-92, Monterey, CA, USA,1979
- M. Behringer, Analysis of the Security of BGP/MPLS IP VPNs, Internet Draft, Jan. 2004
- Jonna Bengtsson, Magnus Falk, 'Distributed Denial of Service', TDDC03 Information Security, May 6, 2003, Linkoeping University
- Richard Carlson, T. H. Dunigan, Russ Hobby, Harvey B. Newman, John P. Streck, Mladen A. Vouk, 'Strategies & Issues: Measuring End-to-End InternetPerformance',http://www.networkmagazine.com/shared/article/showArticle.jhtml? articleId=8703532
- Cisco Systems, White Papers, Security of the MPLS Architecture, Cisco Systems Inc
- B. Gamm, B. Howard, O. Paridaens, 'Security features required in an NGN', Alcatel Telecommunications Review, 2nd Quarter 2001, pp.l29-133
- Evdoxia Spyropoulou, Timothy E. Levin, and Cynthia E. Irvine, Calculating costs for quality of security service, In Proc. of the 16th Annual Computer Security Applications Conference, pp334-343, New Orleans, Louisiana, USA, Dec. 11-15, 2000
- Ravi Sinha, MPLS-VPN Services and Security, GSEC Practical Ver l.4b, Option 1, SANS Institute 2003
- A. Striegel, 'Security Issues in a Differentiated Services Internet'
- 'Telecommunications and Internet Protocol Hannonization over Networks(TIPHON) Security; Threat Analysis', DTR/TIPHON - 08002 V0.1.9 (2001-02-09)
- Stefan Lindskog, Erland Jonsson, 'Introducing Security m QoS Architectures'
- Tsung-Li Wu, S. Felix Wu, Zhi Fu, He Huang, Feng-Min Gong, 'Securing QoS:Threats to RSVP Messages and their Countermeasures'
- ITU-T X.80S Rec., Security architecture for systems providing end-to-end communications.