메뉴 건너뛰기




Volumn 33, Issue 4, 2003, Pages 432-445

Active Security Support for Active Networks

Author keywords

Active access control; Active capability; Active networks; Active security guardian; Quality of protection (QoP); Security API

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER OPERATING SYSTEMS; SECURITY OF DATA;

EID: 0242489532     PISSN: 10946977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCC.2003.818498     Document Type: Article
Times cited : (16)

References (54)
  • 2
    • 0003396725 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. Comput. Sci., Princeton Univ., Princeton, NJ, Jan.
    • D. S. Wallach, "A New Approach to Mobile Code Security," Ph.D. dissertation, Dept. Comput. Sci., Princeton Univ., Princeton, NJ, Jan. 1999.
    • (1999) A New Approach to Mobile Code Security
    • Wallach, D.S.1
  • 5
    • 0010951688 scopus 로고    scopus 로고
    • Securing the node of an active network
    • S. Hariri, C. Lee, and C. Raghavendra, Eds. Boston, MA: Kluwer, Sept.
    • Z. Liu, R. H. Campbell, and M. D. Mickunas, "Securing the node of an active network," in Active Middleware Services. S. Hariri, C. Lee, and C. Raghavendra, Eds. Boston, MA: Kluwer, Sept. 2000.
    • (2000) Active Middleware Services
    • Liu, Z.1    Campbell, R.H.2    Mickunas, M.D.3
  • 6
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Feb.
    • R. S. Sandhu and E. J. Coyne, "Role-based access control models," IEEE Computer, vol. 29, no. 2, Feb. 1996.
    • (1996) IEEE Computer , vol.29 , Issue.2
    • Sandhu, R.S.1    Coyne, E.J.2
  • 7
    • 0242434993 scopus 로고    scopus 로고
    • [Online]
    • The SwitchWare Project Homepage at the University of Pennsylvania. [Online] Available http://www.cis.upenn.edu/̃switchware/
    • The SwitchWare Project Homepage
  • 11
    • 0242677219 scopus 로고    scopus 로고
    • Making login services independent from authentication technologies
    • Mar.
    • V. Samar and C. Lai, "Making login services independent from authentication technologies," in Proc. SunSoft Developer's Conf., Mar. 1996.
    • (1996) Proc. SunSoft Developer's Conf.
    • Samar, V.1    Lai, C.2
  • 12
    • 0042748417 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure Certificates Management Protocols
    • Mar.
    • C. Adams and S. Farrell, Internet X.509 Public Key Infrastructure Certificates Management Protocols, RFC 2510, Mar. 1999.
    • (1999) RFC , vol.2510
    • Adams, C.1    Farrell, S.2
  • 14
    • 0345673605 scopus 로고    scopus 로고
    • Generic Security Service Application Program Interface, Ver. 2
    • Jan.
    • J. Linn, Generic Security Service Application Program Interface, Ver. 2, RFC 2078, Jan. 1997.
    • (1997) RFC , vol.2078
    • Linn, J.1
  • 15
    • 0242434979 scopus 로고    scopus 로고
    • Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API)
    • Dec.
    • C. Adams, Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API), RFC 2479, Dec. 1998.
    • (1998) RFC , vol.2479
    • Adams, C.1
  • 19
    • 0012023903 scopus 로고    scopus 로고
    • The Kerberos Ver. 5 GSS-API Mechanism
    • June
    • J. Linn, The Kerberos Ver. 5 GSS-API Mechanism, RFC 1964, June 1996.
    • (1996) RFC , vol.1964
    • Linn, J.1
  • 20
    • 0242603234 scopus 로고    scopus 로고
    • The Simple Public-Key GSS-API Mechanism (SPKM)
    • Oct.
    • C. Adams, The Simple Public-Key GSS-API Mechanism (SPKM), RFC 2025, Oct. 1996.
    • (1996) RFC , vol.2025
    • Adams, C.1
  • 22
    • 0242434986 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. Comput. Sci., Univ. Illinois at Urbana-Champaign, Oct.
    • Z. Liu, "Securing the Node of an Active Network," Ph.D. dissertation, Dept. Comput. Sci., Univ. Illinois at Urbana-Champaign, Oct. 2001.
    • (2001) Securing the Node of an Active Network
    • Liu, Z.1
  • 23
    • 0242687209 scopus 로고    scopus 로고
    • [Online]
    • IAIK-JCE package. [Online] Available http://jcewww.iaik.tu-graz.ac.at/
    • IAIK-JCE Package
  • 24
    • 0242518522 scopus 로고    scopus 로고
    • [Online]
    • Snacc for Java. [Online] Available http://www.alphaworks.ibm.com/tech/snaccforjava
    • Snacc for Java
  • 25
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure Certificate and CRL Profile
    • Jan.
    • R. Housley, W. Ford, W. Polk, and D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459, Jan. 1999.
    • (1999) RFC , vol.2459
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 29
    • 0029232070 scopus 로고
    • A higher level of computer security through active policies
    • M. D. Abrams and J. D. Moffett, "A higher level of computer security through active policies," Comput. Security, vol. 14, no. 2, pp. 147-157, 1995.
    • (1995) Comput. Security , vol.14 , Issue.2 , pp. 147-157
    • Abrams, M.D.1    Moffett, J.D.2
  • 31
    • 85170567129 scopus 로고
    • Low-level security in Java
    • Dec.
    • F. Yelin, "Low-level security in Java," in WWW4 Conference, Dec. 1995.
    • (1995) WWW4 Conference
    • Yelin, F.1
  • 34
    • 84983308848 scopus 로고    scopus 로고
    • ANTS: A toolkit for building and dynamically deploying network protocols
    • San Francisco, CA, Apr.
    • D. Wetherall, J. Guttag, and D. Tennenhouse, "ANTS: a toolkit for building and dynamically deploying network protocols," in IEEE OPENARCH'98, San Francisco, CA, Apr. 1998.
    • (1998) IEEE OPENARCH'98
    • Wetherall, D.1    Guttag, J.2    Tennenhouse, D.3
  • 35
    • 84962248491 scopus 로고    scopus 로고
    • Seraphim: Dynamic interoperable security architecture for active networks
    • Tel-Aviv, Israel, Mar. 26-27
    • R. H. Campbell, Z. Liu, M. D. Mickunas, P. Naldurg, and S. Yi, "Seraphim: dynamic interoperable security architecture for active networks," in IEEE OPENARCH 2000, Tel-Aviv, Israel, Mar. 26-27, 2000.
    • (2000) IEEE OPENARCH 2000
    • Campbell, R.H.1    Liu, Z.2    Mickunas, M.D.3    Naldurg, P.4    Yi, S.5
  • 39
    • 84940110094 scopus 로고    scopus 로고
    • Flexible policy-directed code safety
    • Oakland, CA, May 9-12
    • D. Evans and A. Twyman, "Flexible policy-directed code safety, " in IEEE Symp. Security and Privacy, Oakland, CA, May 9-12, 1999.
    • (1999) IEEE Symp. Security and Privacy
    • Evans, D.1    Twyman, A.2
  • 41
    • 0041859446 scopus 로고    scopus 로고
    • DTOS General System Security and Assurability Assessment Report
    • June
    • Secure Computing Corporation, "DTOS General System Security and Assurability Assessment Report,", Tech. Rep. MD A904-93-C-4209 CDRL A011, June 1997.
    • (1997) Tech. Rep. , vol.MD A904-93-C-4209 CDRL A011
  • 43
    • 0242434988 scopus 로고    scopus 로고
    • private communication
    • S. Schwab, private communication.
    • Schwab, S.1
  • 45
    • 85084163247 scopus 로고
    • Providing policy control over object operations in a Mach based system
    • June
    • S. E. Minear, "Providing policy control over object operations in a Mach based system," in Proc. Fifth USENIX UNIX Security Symp., June 1995, pp. 141-156.
    • (1995) Proc. Fifth USENIX UNIX Security Symp. , pp. 141-156
    • Minear, S.E.1
  • 49
    • 0003288391 scopus 로고    scopus 로고
    • Domain Name System Security Extensions
    • Mar.
    • D. Eastlake, Domain Name System Security Extensions, RFC 2535, Mar. 1999.
    • (1999) RFC , vol.2535
    • Eastlake, D.1
  • 51
    • 0242603240 scopus 로고    scopus 로고
    • A specification-based coverage metric to evaluate test sets, international journal of reliability
    • Dec.
    • P. E. Ammann and P. E. Black, "A specification-based coverage metric to evaluate test sets, international journal of reliability," Qual. Safety Eng., Dec. 2000.
    • (2000) Qual. Safety Eng.
    • Ammann, P.E.1    Black, P.E.2
  • 53
    • 84949497326 scopus 로고    scopus 로고
    • Maude as a formal meta-tool
    • FM'99 - Formal Methods, J. Wing and J. Woodcock, Eds. Berlin, Germany: Springer-Verlag
    • M. Clavel, F. Duran, S. Eker, J. Meseguer, and M.-O. Stehr, "Maude as a formal meta-tool," in FM'99 - Formal Methods, J. Wing and J. Woodcock, Eds. Berlin, Germany: Springer-Verlag, 1999, vol. 1709, Lecture Notes in Computer Science, pp. 1684-1703.
    • (1999) Lecture Notes in Computer Science , vol.1709 , pp. 1684-1703
    • Clavel, M.1    Duran, F.2    Eker, S.3    Meseguer, J.4    Stehr, M.-O.5
  • 54
    • 84961707449 scopus 로고    scopus 로고
    • Formal specification and analysis of active networks and communication protocols: The Maude experience
    • Hilton Head, South Carolina, Jan.
    • G. Denker, J. Meseguer, and C. Talcott, "Formal specification and analysis of active networks and communication protocols: the Maude experience," in Proc. DARPA Information Survivability Conf. Expo. (DISCEX'00), vol. 1, Hilton Head, South Carolina, Jan. 2000, pp. 251-265.
    • (2000) Proc. DARPA Information Survivability Conf. Expo. (DISCEX'00) , vol.1 , pp. 251-265
    • Denker, G.1    Meseguer, J.2    Talcott, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.