메뉴 건너뛰기




Volumn , Issue , 2004, Pages 495-500

Architecture for secure work of dynamic distributed groups

Author keywords

e Commerce; Network Management and Control; Network Security; Protocols

Indexed keywords

ELECTRONIC COMMERCE; EXTRANETS; NETWORK PROTOCOLS; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA; TOPOLOGY;

EID: 3042673052     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (25)
  • 1
    • 0003358190 scopus 로고    scopus 로고
    • Mobility support in IPv6
    • Internet Engineering Task Force, draft-ietf-mobileip-ipv6-12.txt. April
    • Johnson D., Perkins C.: "Mobility Support in IPv6", Internet Draft, Internet Engineering Task Force, draft-ietf-mobileip-ipv6-12.txt. April 2000.
    • (2000) Internet Draft
    • Johnson, D.1    Perkins, C.2
  • 3
    • 3042662726 scopus 로고    scopus 로고
    • 2001 CSI/FBI computer crime and security survey
    • Spring
    • Computer Security Institute (CSI): "2001 CSI/FBI Computer Crime and Security Survey", Computer Security Issues & Trends Vol. VII, No. 1, Spring 2001; http://www.gosci.com/
    • (2001) Computer Security Issues & Trends , vol.7 , Issue.1
  • 6
    • 0003406370 scopus 로고    scopus 로고
    • Dynamic virtual private networks
    • August
    • Rodeh O., Birman K., Hayden M., Dolev D.: "Dynamic Virtual Private Networks", Technical Report TR98-1695, August 1998, http://www.cs.huji.ac. il/~orodeh/papers/dypn/dvpn.html
    • (1998) Technical Report , vol.TR98-1695
    • Rodeh, O.1    Birman, K.2    Hayden, M.3    Dolev, D.4
  • 7
    • 0033282261 scopus 로고    scopus 로고
    • Application of virtual private networking technology to standards-based management protocols across heterogeneous firewall-protected networks
    • IEEE
    • O'Guin S., Williams C.K., Selimis N.: "Application of Virtual Private Networking Technology to Standards-Based Management Protocols Across Heterogeneous Firewall-Protected Networks", Proc of Military Communications Conference (MILCOM). IEEE 1999, vol2, pp.1251-1255.
    • (1999) Proc of Military Communications Conference (MILCOM) , vol.2 , pp. 1251-1255
    • O'Guin, S.1    Williams, C.K.2    Selimis, N.3
  • 11
    • 3042653675 scopus 로고    scopus 로고
    • Relationship management: Secure collaboration in a ubiquitous environment
    • April/June
    • Epp E.C.: "Relationship Management: Secure Collaboration in a Ubiquitous Environment", IEEE Pervasive Computing Magazine, April/June 2003. pp.62-71
    • (2003) IEEE Pervasive Computing Magazine , pp. 62-71
    • Epp, E.C.1
  • 12
    • 3042659028 scopus 로고    scopus 로고
    • Robust membership management for Ad-hoc groups
    • th Int. Security Protocols Workshop
    • th Int. Security Protocols Workshop, LNCS 2467, 2001.pp 63-79
    • (2001) LNCS , vol.2467 , pp. 63-79
    • Maki, S.1    Aura, T.2    Hietalahti, M.3
  • 13
    • 3042659030 scopus 로고    scopus 로고
    • Groove, http://www.groove.net/products/
  • 14
    • 3042560432 scopus 로고    scopus 로고
    • http://www.ixta.org
  • 16
    • 0004208503 scopus 로고    scopus 로고
    • login, Nov
    • Bellovin S.M.: "Distributed Firewalls", login, pp.37-39, Nov 1999, www.research.att.com/-smb/papers/distfw.pdf
    • (1999) Distributed Firewalls , pp. 37-39
    • Bellovin, S.M.1
  • 17
    • 84966551241 scopus 로고    scopus 로고
    • Intranet security with micro-firewalls and mobile agents for proactive intrusion response
    • Gangadharan M., Hwang K.: "Intranet Security with micro-Firewalls and Mobile Agents for Proactive Intrusion Response", Int. Conf. on Computer Networks and Mobile Computing, 2001. pp. 325-332
    • (2001) Int. Conf. on Computer Networks and Mobile Computing , pp. 325-332
    • Gangadharan, M.1    Hwang, K.2
  • 18
    • 84944042166 scopus 로고    scopus 로고
    • A distributed dynamic micro-firewall architecture with mobile agents and keynote trust management system
    • th Int. Conf. on Information and Communications Security
    • th Int. Conf. on Information and Communications Security, LNCS 2513, 2002. pp. 13-24
    • (2002) LNCS , vol.2513 , pp. 13-24
    • Jin, H.1    Xian, F.2    Han, Z.3    Li, S.4
  • 20
    • 0011917214 scopus 로고    scopus 로고
    • ITU Recommendation X.509 (also ISO/IEC 9594-8, 1995). International Telecommunications Union, June
    • ITU Recommendation X.509, The Directory: Authentication Framework (also ISO/IEC 9594-8, 1995). International Telecommunications Union, June 1997.
    • (1997) The Directory: Authentication Framework
  • 22
    • 0012736565 scopus 로고    scopus 로고
    • RBAC policies in XML for X.509 based privilege management
    • Kluwer Academic Publishers
    • Chadwick D.W., Otenko A.: "RBAC Policies in XML for X.509 Based Privilege Management", Proc. IFIP SEC 2002, Kluwer Academic Publishers 2002.
    • (2002) Proc. IFIP SEC 2002
    • Chadwick, D.W.1    Otenko, A.2
  • 23
    • 4544264708 scopus 로고    scopus 로고
    • Policy driven access control over distributed firewall architecture
    • IEEE Computer Society 2002, ISBN 0-7695-16114
    • Dimitrakos T., Djordjevic I., Matthews B., Bicarregui J., Phillips C. Policy Driven Access Control over Distributed Firewall Architecture. Proc of Policy2002, IEEE Computer Society 2002, ISBN 0-7695-16114, pp. 228-231.
    • Proc of Policy 2002 , pp. 228-231
    • Dimitrakos, T.1    Djordjevic, I.2    Matthews, B.3    Bicarregui, J.4    Phillips, C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.