메뉴 건너뛰기




Volumn 44, Issue 3, 2006, Pages 134-141

Taxonomy of conflicts in network security policies

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM FIREWALLS; DATA COMMUNICATION SYSTEMS; INTERNET; SEMANTICS; TELECOMMUNICATION TRAFFIC;

EID: 33645337636     PISSN: 01636804     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCOM.2006.1607877     Document Type: Article
Times cited : (153)

References (10)
  • 2
    • 0038419774 scopus 로고    scopus 로고
    • "IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution"
    • Jan
    • Z. Fu et al., "IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution," Proc. Policy 2001 Wksp., Jan. 2001.
    • (2001) Proc. Policy 2001 Wksp.
    • Fu, Z.1
  • 3
    • 33645362360 scopus 로고    scopus 로고
    • "IPSec Configuration Policy Information Model"
    • IETF RFC 3585, Aug
    • K. Jason, L. Rafalow, and E. Vyncke, "IPSec Configuration Policy Information Model," IETF RFC 3585, Aug. 2003.
    • (2003)
    • Jason, K.1    Rafalow, L.2    Vyncke, E.3
  • 4
    • 33750946274 scopus 로고    scopus 로고
    • "Configuring IPSec Network Security"
    • Rel. 12.2, Cisco Systems, Inc
    • "Configuring IPSec Network Security," Cisco IOS Security Configuration Guide, Rel. 12.2, Cisco Systems, Inc.
    • Cisco IOS Security Configuration Guide
  • 5
    • 0003470642 scopus 로고    scopus 로고
    • "Security Architecture for the Internet Protocol"
    • IETF RFC 2401, Nov
    • S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol," IETF RFC 2401, Nov. 1998.
    • (1998)
    • Kent, S.1    Atkinson, R.2
  • 6
    • 33744518446 scopus 로고    scopus 로고
    • "Modeling and Verification of IPSec and VPN Security Policies"
    • Nov
    • H. Hamed, E. Al-Shaer, and W. Marrero, "Modeling and Verification of IPSec and VPN Security Policies," Proc. IEEE ICNP '05, Nov. 2005.
    • (2005) Proc. IEEE ICNP '05
    • Hamed, H.1    Al-Shaer, E.2    Marrero, W.3
  • 7
    • 0022769976 scopus 로고
    • "Graph-Based Algorithms for Boolean Function Manipulation"
    • Aug
    • R. Bryant, "Graph-Based Algorithms for Boolean Function Manipulation," IEEE Trans. Comp., Aug. 1986.
    • (1986) IEEE Trans. Comp.
    • Bryant, R.1
  • 8
    • 8344229907 scopus 로고    scopus 로고
    • "Discovery of Policy Anomalies in Distributed Firewalls"
    • Mar
    • E. Al-Shaer and H. Hamed, "Discovery of Policy Anomalies in Distributed Firewalls," Proc. IEEE INFOCOM '04, Mar. 2004.
    • (2004) Proc. IEEE INFOCOM '04
    • Al-Shaer, E.1    Hamed, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.