메뉴 건너뛰기




Volumn 4, Issue 1-2, 2005, Pages 29-48

Rigorous automated network security management

Author keywords

Filtering routers; Formal methods; IP security protocols; Network security; Security management

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; DATA COMMUNICATION SYSTEMS; NETWORK PROTOCOLS; ROUTERS;

EID: 14844314179     PISSN: 16155262     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10207-004-0052-x     Document Type: Article
Times cited : (47)

References (22)
  • 2
    • 85084160050 scopus 로고    scopus 로고
    • Problem areas for the IP security protocols
    • July 1996. Also at ftp://ftp.research.att.com/dist/smb/badesp.ps
    • Bellovin S (1996) Problem areas for the IP security protocols. In: Proceedings of the 6th USENIX UNIX security symposium, July 1996. Also at ftp://ftp.research.att.com/dist/smb/badesp.ps
    • (1996) Proceedings of the 6th USENIX UNIX Security Symposium
    • Bellovin, S.1
  • 4
    • 0022769976 scopus 로고
    • Graph-based algorithms for boolean function manipulation
    • Bryant RE (1986) Graph-based algorithms for boolean function manipulation. IEEE Trans Comput C-35(8):677-691
    • (1986) IEEE Trans. Comput. C , vol.35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 5
    • 14844312690 scopus 로고
    • Cisco Systems 10th edn. Chapters 10 to 17 (especially Chapter 16). For more recent information, see
    • Cisco Systems (1994) Router Products Command Reference, 10th edn. Chapters 10 to 17 (especially Chapter 16). For more recent information, see http://www.cisco.com/univercd/
    • (1994) Router Products Command Reference
  • 6
    • 0005240447 scopus 로고    scopus 로고
    • A cryptographic evaluation of ipsec
    • Counterpane Internet Security, Inc
    • Ferguson N, Schneier B (1999) A cryptographic evaluation of ipsec. Counterpane Internet Security, Inc.http://www.counterpane.com/ipsec.html
    • (1999)
    • Ferguson, N.1    Schneier, B.2
  • 8
    • 18444377006 scopus 로고    scopus 로고
    • Security goals: Packet trajectories and strand spaces
    • Gorrieri R, Focardi R (eds), Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Guttman JD (2001) Security goals: Packet trajectories and strand spaces. In: Gorrieri R, Focardi R (eds) Foundations of security analysis and design. Lecture notes in computer science, vol 2171. Springer, Berlin Heidelberg New York, pp 197-261
    • (2001) Foundations of Security Analysis and Design , vol.2171 , pp. 197-261
    • Guttman, J.D.1
  • 10
    • 84944030742 scopus 로고    scopus 로고
    • Authentication and confidentiality via IPsec
    • Gollman D (ed), Lecture notes in computer science Springer, Berlin Heidelberg New York
    • Guttman JD, Herzog AL, Thayer FJ (2000) Authentication and confidentiality via IPsec. In: Gollman D (ed) ESORICS 2000: European symposium on research in computer security. Lecture notes in computer science, vol 1895. Springer, Berlin Heidelberg New York
    • (2000) ESORICS 2000: European Symposium on Research in Computer Security , vol.1895
    • Guttman, J.D.1    Herzog, A.L.2    Thayer, F.J.3
  • 12
    • 0004006818 scopus 로고    scopus 로고
    • IP authentication header
    • IETF Network Working Group RFC 2402, November 1998
    • Kent S, Atkinson R (1998) IP authentication header. IETF Network Working Group RFC 2402, November 1998
    • (1998)
    • Kent, S.1    Atkinson, R.2
  • 13
    • 0004044627 scopus 로고    scopus 로고
    • IP encapsulating security payload
    • IETF Network Working Group RFC 2406, November 1998
    • Kent S, Atkinson R (1998) IP encapsulating security payload. IETF Network Working Group RFC 2406, November 1998
    • (1998)
    • Kent, S.1    Atkinson, R.2
  • 14
    • 0003470642 scopus 로고    scopus 로고
    • Security Architecture for the Internet protocol
    • IETF Network Working Group RFC 2401, November 1998
    • Kent S, Atkinson R (1998) Security Architecture for the Internet protocol. IETF Network Working Group RFC 2401, November 1998
    • (1998)
    • Kent, S.1    Atkinson, R.2
  • 18
    • 14844321177 scopus 로고    scopus 로고
    • Internet Security Association and Key Management Protocol (ISAKMP), IETF Network Working Group RFC 2408, November 1998
    • Maughan D, Schertler M, Schneider M, Turner J (1998) Internet Security Association and Key Management Protocol (ISAKMP). IETF Network Working Group RFC 2408, November 1998
    • (1998)
    • Maughan, D.1    Schertler, M.2    Schneider, M.3    Turner, J.4
  • 20
    • 14844306631 scopus 로고    scopus 로고
    • Ip filter
    • Download Web Page, December
    • Reed D (2002) Ip filter. Download Web Page, December. URL http://coombs.anu.edu.au/avalon/
    • (2002)
    • Reed, D.1
  • 21
    • 84861250584 scopus 로고    scopus 로고
    • Linux ip firewalling chains
    • Linux Howto, October 2000
    • Russell R (2000) Linux ip firewalling chains. Linux Howto, October 2000. URL http://www.netfilter.org/ipchains/
    • (2000)
    • Russell, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.