-
1
-
-
0003515463
-
-
Prentice-Hall, Upper Saddle River, New Jersey
-
AHUJA, R. K., MAGNANTI, T. L., AND ORLIN, J. B. 1993. Network Flows: Theory, Algorithms, and Applications. Prentice-Hall, Upper Saddle River, New Jersey.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
2
-
-
0032643221
-
Firmato: A novel firewall management toolkit
-
IEEE, Oakland, CA
-
BARTAL, Y., MAYER, A., NISSIM, K., AND WOOL, A. 1999. Firmato: A novel firewall management toolkit. In Proceedings of the 20th IEEE Symp. on Security and Privacy. IEEE, Oakland, CA. 17-31.
-
(1999)
Proceedings of the 20th IEEE Symp. on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
4
-
-
85084164023
-
A comparison of methods for implementing adaptive security policies
-
Usenix Association, Berkeley
-
CARNEY, M, AND LOE, B, 1998. A comparison of methods for implementing adaptive security policies. In Proceedings of the 7th USENIX Security Symposium. Usenix Association, Berkeley. 1-14.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 1-14
-
-
Carney, M.1
Loe, B.2
-
7
-
-
0003437009
-
-
Addison-Wesley
-
CHESWICK, W. R., BELLOVIN, S. M., AND RUBIN, A. 2003. Firewalls and Internet Security: Repelling the Wily Hacker, 2nd ed. Addison-Wesley.
-
(2003)
Firewalls and Internet Security: Repelling the Wily Hacker, 2nd Ed.
-
-
Cheswick, W.R.1
Bellovin, S.M.2
Rubin, A.3
-
9
-
-
84860062774
-
-
FWB 2002. Firewall builder. http://www.fwbuilder.org.
-
(2002)
Firewall Builder
-
-
-
10
-
-
0027553807
-
A technique for drawing directed graphs
-
GANSNER, E. R., KOUTSOFIOS, E., NORTH, S. C., AND VO, K.-P. 1993. A technique for drawing directed graphs. IEEE Trans. Softw. Eng. 19, 3, 214-230.
-
(1993)
IEEE Trans. Softw. Eng.
, vol.19
, Issue.3
, pp. 214-230
-
-
Gansner, E.R.1
Koutsofios, E.2
North, S.C.3
Vo, K.-P.4
-
14
-
-
84944030742
-
Authentication and confidentiality via IPsec
-
Springer-Verlag
-
GUTTMAN, J. D., HERZOG, A., AND JAVIER THAYER, F. 2000. Authentication and confidentiality via IPsec. In Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS), LNCS 1895. Springer-Verlag.
-
(2000)
Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS), LNCS 1895
-
-
Guttman, J.D.1
Herzog, A.2
Javier Thayer, F.3
-
18
-
-
84940106654
-
What's beyond firewalls?
-
Nov.
-
HOWE, C. D., ERWIN, B., BARTH, C., AND ELLIOT, S. 1996. What's beyond firewalls? The Forrester Report 10, 12 (Nov.).
-
(1996)
The Forrester Report
, vol.10
, Issue.12
-
-
Howe, C.D.1
Erwin, B.2
Barth, C.3
Elliot, S.4
-
19
-
-
84860068274
-
-
ICSA LABS. 2003. Certified firewall products. http://www.icsalabs.com/ html/communities/firewalls/certification/rxvendors/index.shtml.
-
(2003)
Certified Firewall Products
-
-
-
20
-
-
0034449536
-
Implementing a distributed firewall
-
ACM, Athens, Greece
-
IOANNIDIS, S., KEROMYTIS, A. D., BELLOVIN, S. M., AND SMITH, J. M. 2000. Implementing a distributed firewall. In Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS). ACM, Athens, Greece.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS)
-
-
Ioannidis, S.1
Keromytis, A.D.2
Bellovin, S.M.3
Smith, J.M.4
-
21
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Nov.
-
LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov.), 265-310.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
24
-
-
0033691924
-
Fang: A firewall analysis engine
-
IEEE, Oakland, CA
-
MAYER, A., WOOL, A., AND ZISKIND, E. 2000. Fang: A firewall analysis engine. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, Oakland, CA. 177-187.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 177-187
-
-
Mayer, A.1
Wool, A.2
Ziskind, E.3
-
27
-
-
19344364618
-
Role-based access control
-
M. Zerkowitz, Ed. Academic Press
-
SANDHU, R. S. 1998. Role-based access control. In Advances in Computers, M. Zerkowitz, Ed. Vol. 48. Academic Press.
-
(1998)
Advances in Computers
, vol.48
-
-
Sandhu, R.S.1
-
28
-
-
84860067364
-
Solsoft NP: Putting security policies into practice
-
SOLSOFT. 2000. Solsoft NP: Putting security policies into practice. Enterprise Management Associates white paper. http://www.solsoft.com/library/ ema_profiler.pdf.
-
(2000)
Enterprise Management Associates White Paper
-
-
-
29
-
-
84961645820
-
Improving the granularity of access control for Windows 2000
-
Nov.
-
SWIFT, M. M., HOPKINS, A., BRUNDRETT, P., VAN DYKE, C., GARG, P., CHAN, S., GOERTZEL, M., AND JENSENWORTH, G. 2002. Improving the granularity of access control for Windows 2000. ACM Trans. Info. Syst. Secu. 5, 4 (Nov.), 398-437.
-
(2002)
ACM Trans. Info. Syst. Secu.
, vol.5
, Issue.4
, pp. 398-437
-
-
Swift, M.M.1
Hopkins, A.2
Brundrett, P.3
Van Dyke, C.4
Garg, P.5
Chan, S.6
Goertzel, M.7
Jensenworth, G.8
-
31
-
-
85084162640
-
Architecting the lumeta firewall analyzer
-
USENIX, Washington, D.C
-
WOOL, A. 2001. Architecting the Lumeta firewall analyzer. In 10th USENIX Security Symposium. USENIX, Washington, D.C. 85-97.
-
(2001)
10th USENIX Security Symposium
, pp. 85-97
-
-
Wool, A.1
-
32
-
-
3042539179
-
The use and usability of direction-based filtering in firewalls
-
WOOL, A. 2004a. The use and usability of direction-based filtering in firewalls. Computers & Security 23, 6, 459-468.
-
(2004)
Computers & Security
, vol.23
, Issue.6
, pp. 459-468
-
-
Wool, A.1
-
33
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
WOOL, A. 2004b. A quantitative study of firewall configuration errors. IEEE Computer 37, 6, 62-67.
-
(2004)
IEEE Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
|