메뉴 건너뛰기




Volumn 22, Issue 4, 2004, Pages 381-420

Firmato: A novel firewall management toolkit

Author keywords

[No Author keywords available]

Indexed keywords

FIREWALL MANAGEMENT; MODEL DEFINITION LANGUAGE; SECURITY POLICY;

EID: 10944269775     PISSN: 07342071     EISSN: None     Source Type: Journal    
DOI: 10.1145/1035582.1035583     Document Type: Article
Times cited : (115)

References (33)
  • 4
    • 85084164023 scopus 로고    scopus 로고
    • A comparison of methods for implementing adaptive security policies
    • Usenix Association, Berkeley
    • CARNEY, M, AND LOE, B, 1998. A comparison of methods for implementing adaptive security policies. In Proceedings of the 7th USENIX Security Symposium. Usenix Association, Berkeley. 1-14.
    • (1998) Proceedings of the 7th USENIX Security Symposium , pp. 1-14
    • Carney, M.1    Loe, B.2
  • 9
    • 84860062774 scopus 로고    scopus 로고
    • FWB 2002. Firewall builder. http://www.fwbuilder.org.
    • (2002) Firewall Builder
  • 19
    • 84860068274 scopus 로고    scopus 로고
    • ICSA LABS. 2003. Certified firewall products. http://www.icsalabs.com/ html/communities/firewalls/certification/rxvendors/index.shtml.
    • (2003) Certified Firewall Products
  • 21
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • Nov.
    • LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov.), 265-310.
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 27
    • 19344364618 scopus 로고    scopus 로고
    • Role-based access control
    • M. Zerkowitz, Ed. Academic Press
    • SANDHU, R. S. 1998. Role-based access control. In Advances in Computers, M. Zerkowitz, Ed. Vol. 48. Academic Press.
    • (1998) Advances in Computers , vol.48
    • Sandhu, R.S.1
  • 28
    • 84860067364 scopus 로고    scopus 로고
    • Solsoft NP: Putting security policies into practice
    • SOLSOFT. 2000. Solsoft NP: Putting security policies into practice. Enterprise Management Associates white paper. http://www.solsoft.com/library/ ema_profiler.pdf.
    • (2000) Enterprise Management Associates White Paper
  • 31
    • 85084162640 scopus 로고    scopus 로고
    • Architecting the lumeta firewall analyzer
    • USENIX, Washington, D.C
    • WOOL, A. 2001. Architecting the Lumeta firewall analyzer. In 10th USENIX Security Symposium. USENIX, Washington, D.C. 85-97.
    • (2001) 10th USENIX Security Symposium , pp. 85-97
    • Wool, A.1
  • 32
    • 3042539179 scopus 로고    scopus 로고
    • The use and usability of direction-based filtering in firewalls
    • WOOL, A. 2004a. The use and usability of direction-based filtering in firewalls. Computers & Security 23, 6, 459-468.
    • (2004) Computers & Security , vol.23 , Issue.6 , pp. 459-468
    • Wool, A.1
  • 33
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • WOOL, A. 2004b. A quantitative study of firewall configuration errors. IEEE Computer 37, 6, 62-67.
    • (2004) IEEE Computer , vol.37 , Issue.6 , pp. 62-67
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.