메뉴 건너뛰기




Volumn 85, Issue 12, 1997, Pages 2034-2051

Security Issues in Networks with Internet Access

Author keywords

Authentication; Computer network security; Cryptography; Internet

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA;

EID: 0031378491     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/5.650183     Document Type: Article
Times cited : (30)

References (40)
  • 1
    • 85084160050 scopus 로고    scopus 로고
    • Problem areas for the IP security protocols
    • July (Available: ftp://ftp.research.att.com/dist/smb/badesp.ps.)
    • S. M. Bellovin, "Problem areas for the IP security protocols," in Proc. 6th Usenix UNIX Security Symp., July 1996. (Available: ftp://ftp.research.att.com/dist/smb/badesp.ps.)
    • (1996) Proc. 6th Usenix UNIX Security Symp.
    • Bellovin, S.M.1
  • 2
    • 33646934849 scopus 로고    scopus 로고
    • Network and Internet security
    • A. B. Tucker, Jr., Ed. Boca Raton, FL: CRC Press, ch. 92
    • _, "Network and Internet security," The Computer Science and Engineering Handbook, A. B. Tucker, Jr., Ed. Boca Raton, FL: CRC Press, 1997, ch. 92, pp. 1949-1961.
    • (1997) The Computer Science and Engineering Handbook , pp. 1949-1961
  • 5
    • 33646916492 scopus 로고    scopus 로고
    • TCP SYN flooding and IP spoofing attacks
    • CERT advisory 96.21, Sept. (Available: ftp://info.cert.org/pub/cert-advisories/CA" ~96.21 .tcp-synJlooding.)
    • 'TCP SYN flooding and IP spoofing attacks," Computer Emergency Response Team, CERT advisory 96.21, Sept. 1996. (Available: ftp://info.cert.org/pub/cert-advisories/CA" ~96.21 .tcp-synJlooding.)
    • (1996) Computer Emergency Response Team
  • 7
  • 8
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffic and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.VOL. IT-22 , pp. 644-654
    • Diffic, W.1    Hellman, M.E.2
  • 10
    • 33646918203 scopus 로고    scopus 로고
    • Malicious software and hacking
    • A. B. Tucker, Jr., Ed. CRC Press, ch. 93
    • D. Ferbrache and S. Mort, "Malicious software and hacking," in The Computer Science anil Engineering Handbook, A. B. Tucker, Jr., Ed. CRC Press, 1997, ch. 93, pp. 1962-1979.
    • (1997) The Computer Science Anil Engineering Handbook , pp. 1962-1979
    • Ferbrache, D.1    Mort, S.2
  • 12
    • 33646940293 scopus 로고
    • Definition of Internet.
    • Oct. 24
    • Definition of "Internet." (Oct. 24, 1995). Federal Networking Council Resolution. [Online]. Available: http://www.fnc.gov/Internet .res.html.)
    • (1995) Federal Networking Council Resolution.
  • 14
    • 0021510842 scopus 로고
    • UNIX operating system security
    • Oct.
    • F. T. Grarnpp and R. H. Morris, "UNIX operating system security," AT&T Bell Labs. Tech. J., vol. 63, no. 8, pp. 1649-1672, Oct. 1984.
    • (1984) AT&T Bell Labs. Tech. J. , vol.63 , Issue.8 , pp. 1649-1672
    • Grarnpp, F.T.1    Morris, R.H.2
  • 16
    • 0242666599 scopus 로고
    • Computer Science Department, Purdue University, West Lafayette, IN, Purdue Tech. Rep. CSD-TR-94-019, Mar. 12, This report and much relevant information is available at the COAST computer security archive, http://www.cs.purdue.edu/coastJ.
    • G. H. Kim and E. H. Spafford, "Writing, supporting, and evaluating tripwire: A publicly available security tool," Computer Science Department, Purdue University, West Lafayette, IN, Purdue Tech. Rep. CSD-TR-94-019, Mar. 12, 1994. This report and much relevant information is available at the COAST computer security archive, http://www.cs.purdue.edu/coastJ.
    • (1994) Writing, Supporting, and Evaluating Tripwire: a Publicly Available Security Tool
    • Kim, G.H.1    Spafford, E.H.2
  • 18
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. Lampson, "A note on the confinement problem," Commun. ACM. vol. 16, no. 10, pp. 613-615, 1973.
    • (1973) Commun. ACM. , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 19
    • 0842305607 scopus 로고    scopus 로고
    • Protection (security) models and policy
    • A. B. Tucker, Jr., Ed. CRC Press, ch. 90
    • C. E. Landwehr, "Protection (security) models and policy," in The Computer Science and Engineering Handbook, A. B. Tucker, Jr., Ed. CRC Press, 1997, ch. 90, pp. 1914-1928.
    • (1997) The Computer Science and Engineering Handbook , pp. 1914-1928
    • Landwehr, C.E.1
  • 20
    • 0028514027 scopus 로고
    • A taxonomy of computer program security flaws
    • Sept.
    • C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi, "A taxonomy of computer program security flaws," ACM Comput. Suneys, vol. 26, no. 3, pp. 211-254, Sept. 1994.
    • (1994) ACM Comput. Suneys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.E.1    Bull, A.R.2    McDermott, J.P.3    Choi, W.S.4
  • 24
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 26
    • 0003757661 scopus 로고
    • Domain names-Implementation and specification
    • Nov.
    • _, "Domain names-Implementation and specification," Internet Engineering Task Force, RFC 1035, Nov. 1987.
    • (1987) Internet Engineering Task Force, RFC 1035
  • 37
    • 33646933415 scopus 로고    scopus 로고
    • Security holes threaten Microsoft game plan
    • Mar. 28
    • _, "Security holes threaten Microsoft game plan," The New York Times, Mar. 28, 1997.
    • (1997) The New York Times
  • 40
    • 0024087662 scopus 로고
    • Evolution of the MOS transistor-From conception to VLSI
    • C. T. Sah, "Evolution of the MOS transistor-From conception to VLSI," Proc. IEEE, vol. 76, pp. 1280-1326, 1988.
    • (1988) Proc. IEEE , vol.76 , pp. 1280-1326
    • Sah, C.T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.