[1] Denning DE. An intrusion-detection model. IEEE Transactions on Software Engineering, 1987.
[2] Roesch M. Snort - Lightweight Intrusion Detection for Networks. LISA, 1999.
[3] NIST Special Publication 800-94, Guide to Intrusion Detection and Prevention Systems (IDPS), 2007. https://csrc.nist.gov/publications/detail/sp/800-94/final
[4] Sommer R., Paxson V. Outside the closed world: On using machine learning for network intrusion detection. IEEE S&P, 2010.
[5] NIST SP 800-207 Zero Trust Architecture, 2020. https://csrc.nist.gov/publications/detail/sp/800-207/final
[6] NIST SP 800-63-3 Digital Identity Guidelines, 2017. https://pages.nist.gov/800-63-3/
[7] W3C Decentralized Identifiers (DIDs) and Verifiable Credentials. https://www.w3.org/TR/did-core/ https://www.w3.org/TR/vc-data-model/
[8] Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System, 2008.
[9] EIP-4337 Account Abstraction via EntryPoint Contract (2021) — 参考以太坊账户抽象思路。
[10] Goldreich O., Micali S., Wigderson A. How to play any mental game — secure multi-party computation foundations.
[11] Bank for International Settlements (BIS) 与 IMF 关于稳定币与数字货币的研究报告(相关政策与风险评估),2020–2022年文献集合。
评论
Alex88
分析全面且有分阶段的落地方案,特别赞同先做SIEM与链上监控。
小程
关于MPC的推理很有说服力,想了解更多可用的门限签名库。
CryptoFan
建议增加对用户体验的说明,安全和易用需并行推进。
王博
引用了NIST和W3C标准,增强了文章权威性,推荐阅读。
Eve
投票已选B,MPC看起来最能降低单点故障风险。
林雨
希望看到tpwalletfun具体的技术栈建议,以及与监管沙盒对接的实践案例。