메뉴 건너뛰기




Volumn , Issue , 2003, Pages 217-230

Dynamic and risk-aware network access management

Author keywords

Dynamic access control; Network management; Risk; Risk awareness; Role

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; COMPUTER SIMULATION; COMPUTER SYSTEM FIREWALLS; DATA ACQUISITION; DATA COMMUNICATION SYSTEMS; TELECOMMUNICATION TRAFFIC;

EID: 0242456725     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/775412.775441     Document Type: Conference Paper
Times cited : (18)

References (18)
  • 2
    • 0242655641 scopus 로고    scopus 로고
    • ForeScout. ActiveScout. World Wide Web
    • ForeScout. ActiveScout. World Wide Web, 2002. http://www.forescout.com/activescout.html.
    • (2002)
  • 3
    • 0026837237 scopus 로고
    • Integration of user authentication and access control
    • L. Harn and H. Lin. Integration of user authentication and access control. In IEE Proceedings-E, volume 139, number 2, pages 139-143, 1992.
    • (1992) IEE Proceedings-E , vol.139 , Issue.2 , pp. 139-143
    • Harn, L.1    Lin, H.2
  • 4
    • 0242403867 scopus 로고    scopus 로고
    • Internet Assigned Numbers Authority. Port numbers. World Wide Web
    • Internet Assigned Numbers Authority. Port numbers. World Wide Web. http://www.iana.org/assignments/port-numbers.
  • 8
    • 0003871309 scopus 로고
    • Network time protocol (version 3) specification, implementation and analysis
    • RFC 1305, March
    • D. L. Mills. Network Time Protocol (version 3) specification, implementation and analysis. RFC 1305, March 1992.
    • (1992)
    • Mills, D.L.1
  • 9
    • 0242314805 scopus 로고    scopus 로고
    • The spread of the Sapphire/Slammer worm
    • Technical report, January
    • D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. The spread of the Sapphire/Slammer worm. Technical report, January 2003. http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html.
    • (2003)
    • Moore, D.1    Paxson, V.2    Savage, S.3    Shannon, C.4    Staniford, S.5    Weaver, N.6
  • 10
    • 0242571322 scopus 로고    scopus 로고
    • Dynamic access control policies in Seraphim
    • Technical Report UIUCDCS-R-2002-2260, Computer Science Department, University of Illinois at Urbana-Champaign, February
    • P. Naldurg and R. H. Campbell. Dynamic access control policies in Seraphim. Technical Report UIUCDCS-R-2002-2260, Computer Science Department, University of Illinois at Urbana-Champaign, February 2002.
    • (2002)
    • Naldurg, P.1    Campbell, R.H.2
  • 12
    • 0012109964 scopus 로고    scopus 로고
    • Know your enemy: Passive fingerprinting
    • World Wide Web, March
    • L. Spitzner. Know your enemy: Passive fingerprinting. World Wide Web, March 2002. http://project.honeynet.org/papers/finger/.
    • (2002)
    • Spitzner, L.1
  • 14
    • 84988603769 scopus 로고
    • Towards a task-based paradigm for flexible and adaptable access control in distributed applications
    • Little Compton, RI
    • R. K. Thomas and R. S. Sandhu. Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In Proceedings on the 1992-1993 Workshop on New Security Paradigms, pages 138-142, Little Compton, RI, 1993.
    • (1993) Proceedings on the 1992-1993 Workshop on New Security Paradigms , pp. 138-142
    • Thomas, R.K.1    Sandhu, R.S.2
  • 17
    • 0242571321 scopus 로고    scopus 로고
    • Insider threat to security may be harder to detect, experts say
    • April 12
    • D. Verton. Insider threat to security may be harder to detect, experts say. Computerworld, April 12, 2002.
    • (2002) Computerworld
    • Verton, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.