-
1
-
-
3242808612
-
-
Computer Science Institute, Computer Security Institute, 600 Harrison Street, San Francisco, CA 94107
-
Computer Science Institute, "1997 Computer Crime and Security Survey," Computer Security Institute, 600 Harrison Street, San Francisco, CA 94107.
-
1997 Computer Crime and Security Survey
-
-
-
5
-
-
33845194873
-
VPNs use tunneling to build private business links
-
June 1
-
Fisher, Susan E., "VPNs use tunneling to build private business links," Datamation, Vol 41, No. 23, June 1, 1996.
-
(1996)
Datamation
, vol.41
, Issue.23
-
-
Fisher, Susan E.1
-
6
-
-
85180529378
-
Layer Two Tunneling Protocol 'L2TP'
-
Kory Hamzeh, Tim Kolar, Morgan Littlewood, Gurdeep Singh Pall, Jeff Taarud, Andrew J. Valencia, William Verthein, "Layer Two Tunneling Protocol 'L2TP'," IETF work in progress.
-
IETF work in progress
-
-
Hamzeh, Kory1
Kolar, Tim2
Littlewood, Morgan3
Pall, Gurdeep Singh4
Taarud, Jeff5
Valencia, Andrew J.6
Verthein, William7
-
7
-
-
0003470642
-
Security Architecture for the Internet Protocol
-
August
-
R. Atkinson, "Security Architecture for the Internet Protocol," Internet RFC 1825, August, 1995.
-
(1995)
Internet RFC 1825
-
-
Atkinson, R.1
-
8
-
-
0003254362
-
IP Authentication Header
-
August
-
R. Atkinson, "IP Authentication Header," Internet RFC 1826, August, 1995.
-
(1995)
Internet RFC 1826
-
-
Atkinson, R.1
-
10
-
-
85034495108
-
Digital signature protection of the OSPF routing protocol
-
San Diego, CA
-
S.L Murphy and M.R. Badger, "Digital signature protection of the OSPF routing protocol," ISOC Symposium on Network and Distributed System Security, San Diego, CA., 1996, pp. 93-102.
-
(1996)
ISOC Symposium on Network and Distributed System Security
, pp. 93-102
-
-
Murphy, S.L1
Badger, M.R.2
-
11
-
-
0030695529
-
Securing distance-vector routing protocols
-
San Diego, CA
-
Bradley R. Smith, Shree Murthy and JJ. Garcia-Luna-Aceves, "Securing distance-vector routing protocols," ISOC Symposium on Network and Distributed System Security, San Diego, CA., 1997, pp. 85-92.
-
(1997)
ISOC Symposium on Network and Distributed System Security
, pp. 85-92
-
-
Smith, Bradley R.1
Murthy, Shree2
Garcia-Luna-Aceves, JJ.3
-
12
-
-
85130849634
-
Securing the nimrod routing architecture
-
San Diego, CA
-
Karen E. Sirois and Stephen T. Kent, "Securing the nimrod routing architecture," ISOC Symposium on Network and Distributed System Security, San Diego, CA., 1997, pp. 74-84.
-
(1997)
ISOC Symposium on Network and Distributed System Security
, pp. 74-84
-
-
Sirois, Karen E.1
Kent, Stephen T.2
-
13
-
-
0029727376
-
SKIP - securing the internet
-
IEEE Computer Society Press
-
Germano Caronni, Hannes Lubich, Ashar Aziz, Tom Markson, Rich Skrenta, "SKIP - securing the internet," Proceedings of the fifth workshop on enabling technologies, (WET ICE '96), IEEE Computer Society Press, 1996.
-
(1996)
Proceedings of the fifth workshop on enabling technologies, (WET ICE '96)
-
-
Caronni, Germano1
Lubich, Hannes2
Aziz, Ashar3
Markson, Tom4
Skrenta, Rich5
-
14
-
-
85180537610
-
-
Security Protocol 3, SP3, Document SDN.301, Revision 1.5, 15 May 1989, as published in NIST Publication NIST-IR-90-4250, February
-
SDNS Secure Data Network System, Security Protocol 3, SP3, Document SDN.301, Revision 1.5, 15 May 1989, as published in NIST Publication NIST-IR-90-4250, February 1990
-
(1990)
SDNS Secure Data Network System
-
-
-
15
-
-
85180529196
-
-
ISO/IEC JTC1/SC6, ISO-IEC DIS 11577, International Standards Organisation, Geneva, Switzerland, 29 November
-
ISO/IEC JTC1/SC6, Network Layer Security Protocol, ISO-IEC DIS 11577, International Standards Organisation, Geneva, Switzerland, 29 November, 1992.
-
(1992)
Network Layer Security Protocol
-
-
-
19
-
-
36349020752
-
-
Object Mangement Group, OMG Document Number 95-12-1, Dec., Object Management Group, 492 Old Connecticut Park, Framingham, MA 01701
-
Object Mangement Group, "CORBA Security," OMG Document Number 95-12-1, Dec., 1995, Object Management Group, 492 Old Connecticut Park, Framingham, MA 01701.
-
(1995)
CORBA Security
-
-
-
21
-
-
85180541343
-
-
Checkpoint Software Technologies, Ltd., Checkpoint Software Technologies, Ltd., 400 Seaport Court, Suite 105, Redwood City, CA 94063
-
Checkpoint Software Technologies, Ltd., "Firewall-1 Architecture and Administration, Version 2.1," Checkpoint Software Technologies, Ltd., 400 Seaport Court, Suite 105, Redwood City, CA 94063.
-
Firewall-1 Architecture and Administration, Version 2.1
-
-
-
22
-
-
84958747285
-
Scalability of security in distributed object systems: panel session
-
CA
-
B. Hartman, D. Nessett, and N. Yialelis, “Scalability of security in distributed object systems: panel session,” ISOC Symposium on Network and Distributed System Security San Diego, 1996, CA., pp. 40-41.
-
(1996)
ISOC Symposium on Network and Distributed System Security San Diego
, pp. 40-41
-
-
Hartman, B.1
Nessett, D.2
Yialelis, N.3
-
23
-
-
85180538067
-
-
Institute of Electrical and Electronics Engineers, IEEE, Inc., 345 East 47th St., New York, NY 10017
-
Institute of Electrical and Electronics Engineers, “Standard 802.10-1992, Interoperable LAN/MAN Security (SILS),” IEEE, Inc., 345 East 47th St., New York, NY 10017.
-
Standard 802.10-1992, Interoperable LAN/MAN Security (SILS)
-
-
-
25
-
-
85085159424
-
Network (in)security through IP packet filtering
-
Baltimore, MD, Sept
-
D. Brent Chapman, "Network (in)security through IP packet filtering," In Proceedings Third Usenix UNIX Security Symposium, pp. 63-76, Baltimore, MD, Sept., 1992.
-
(1992)
Proceedings Third Usenix UNIX Security Symposium
, pp. 63-76
-
-
Brent Chapman, D.1
-
29
-
-
0026207086
-
Tools for Distributed Application Management
-
August
-
K. Marzullo, R. Cooper, M. Wood, and K. Birman, “Tools for Distributed Application Management,” IEEE Computer, August, 1991, pp. 42–51.
-
(1991)
IEEE Computer
, pp. 42-51
-
-
Marzullo, K.1
Cooper, R.2
Wood, M.3
Birman, K.4
-
30
-
-
0029700344
-
Decentralized Trust Management
-
Oakland, CA., May
-
M. Blaze, J. Feigenbaum, and L. Lacy, “Decentralized Trust Management,” IEEE Symposium on Security and Privacy, Oakland, CA., May, 1996.
-
(1996)
IEEE Symposium on Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, L.3
-
31
-
-
0026851778
-
BLACKER: Security for the DDN, Examples of A1 Security Engineering Trades
-
May
-
C. Weissman, “BLACKER: Security for the DDN, Examples of A1 Security Engineering Trades,” IEEE Symposium on Security and Privacy, May, 1992, pp. 286-292.
-
(1992)
IEEE Symposium on Security and Privacy
, pp. 286-292
-
-
Weissman, C.1
-
33
-
-
0003418425
-
-
version 6, IETF work in progress
-
D. Maughhan, M. Schertler, M. Schneider, and J. Turner, "Internet Security Association and Key Management Protocol (ISAKMP)", version 6, IETF work in progress
-
Internet Security Association and Key Management Protocol (ISAKMP)
-
-
Maughhan, D.1
Schertler, M.2
Schneider, M.3
Turner, J.4
-
35
-
-
1842445130
-
Policy routing in internetworks
-
Sept., John Wiley and Sons
-
D. Clark, “Policy routing in internetworks,” Internetworking: Research and Experience, Vol 1., No. 1, Sept., 1990, John Wiley and Sons, pp. 35–52.
-
(1990)
Internetworking: Research and Experience
, vol.1
, Issue.1
, pp. 35-52
-
-
Clark, D.1
-
36
-
-
85180536383
-
Policy route certification: requirements and techniques
-
May
-
D. Nessett and D. Solo, “Policy route certification: requirements and techniques,” Information Security, Proceedings of IFIP TC11, 7th International Conference on Information Security, May, 1991, pp. 87–98.
-
(1991)
Information Security, Proceedings of IFIP TC11, 7th International Conference on Information Security
, pp. 87-98
-
-
Nessett, D.1
Solo, D.2
|