Files
amILearningEnough/docs/resources/operatingSystem/securityMechanism.md
2024-12-21 01:23:20 +05:30

55 lines
2.5 KiB
Markdown

# Security Mechanisms
## Official Documentation
- **NIST Special Publications**
- [Link](https://csrc.nist.gov/publications/sp)
- **IETF Security Area**
- [Link](https://datatracker.ietf.org/wg/#sec)
- **W3C Web Security Context**
- [Link](https://www.w3.org/TR/WSC-UI/)
- **OWASP Cheat Sheet Series**
- [Link](https://cheatsheetseries.owasp.org/)
## Research Papers
- **"A Survey of Access Control Models" by R. Sandhu and P. Samarati (1994)**
- [Link](https://ieeexplore.ieee.org/document/312842)
- **"The Evolution of Access Control Models" by D. Ferraiolo and D. Kuhn (2009)**
- [Link](https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=901428)
- **"A Survey of Trust and Reputation Systems for Online Service Provision" by A. Jøsang et al. (2007)**
- [Link](https://dl.acm.org/doi/10.1016/j.dss.2005.05.019)
## Additional Online Resources
- **Cryptography and Security on ArXiv**
- [Link](https://arxiv.org/list/cs.CR/recent)
- **Mozilla Web Security Guidelines**
- [Link](https://infosec.mozilla.org/guidelines/web_security)
- **SANS Reading Room**
- [Link](https://www.sans.org/reading-room/)
## Books
- **"Cryptography and Network Security: Principles and Practice" by William Stallings**
- ISBN: 0134444280
- Provides a comprehensive overview of the principles and practices of cryptography and network security.
- **"Computer Security: Principles and Practice" by William Stallings and Lawrie Brown**
- ISBN: 0134794109
- Offers a broad introduction to the various aspects of computer security.
- **"Security Engineering: A Guide to Building Dependable Distributed Systems" by Ross Anderson**
- ISBN: 0470068523
- Covers a wide range of security mechanisms and their applications in various systems.
- **"Applied Cryptography: Protocols, Algorithms, and Source Code in C" by Bruce Schneier**
- ISBN: 1119096723
- Provides an in-depth look at cryptographic algorithms and protocols.
## Standards
- **ISO/IEC 27002:2013 Code of practice for information security controls**
- Provides best practice recommendations on information security controls
- **FIPS 140-3 Security Requirements for Cryptographic Modules**
- [Link](https://csrc.nist.gov/publications/detail/fips/140/3/final)
## Online Courses
- **Coursera: Cryptography I by Stanford University**
- [Link](https://www.coursera.org/learn/crypto)
- **edX: Introduction to Cybersecurity**
- [Link](https://www.edx.org/course/introduction-to-cybersecurity)
- **Udacity: Applied Cryptography**
- [Link](https://www.udacity.com/course/applied-cryptography--cs387)