메뉴 건너뛰기




Volumn , Issue , 2007, Pages 284-293

Design and implementation of cross-domain cooperative firewall

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM FIREWALLS; INTERNET; INTERNET PROTOCOLS; LAWS AND LEGISLATION; LEAD; NETWORK PROTOCOLS; PERSONAL COMMUNICATION SYSTEMS; TUNNELS; WI-FI;

EID: 48349089344     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2007.4375859     Document Type: Conference Paper
Times cited : (43)

References (26)
  • 1
    • 0001772530 scopus 로고
    • Protocols for secure computations
    • A. Yao, "Protocols for secure computations," in Proc. FOCS, 1982.
    • (1982) Proc. FOCS
    • Yao, A.1
  • 2
    • 0242698195 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • D. Agrawal and C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in Proc. PODS, 2001.
    • (2001) Proc. PODS
    • Agrawal, D.1    Aggarwal, C.2
  • 5
    • 85012127915 scopus 로고    scopus 로고
    • Privacy-preserving indexing of documents on the network
    • M. Bawa, R. Bayardo, and R. Agrawal, "Privacy-preserving indexing of documents on the network," in Proc. VLDB, 2003.
    • (2003) Proc. VLDB
    • Bawa, M.1    Bayardo, R.2    Agrawal, R.3
  • 6
    • 0033280866 scopus 로고    scopus 로고
    • Efficient private bidding and auctions with an oblivious third party
    • C. Cachin, "Efficient private bidding and auctions with an oblivious third party," in Proc. ACM CCS, 1999.
    • (1999) Proc. ACM CCS
    • Cachin, C.1
  • 7
    • 48349113304 scopus 로고    scopus 로고
    • Cisco VPN Concentrator, http://www.cisco.com/en/US/products/hw/ vpndevc/ps2284/.
    • Cisco VPN Concentrator
  • 8
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. on Information Theory, vol. 22, no. 6, pp. 644-654, November 1976.
    • (1976) IEEE Trans. on Information Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 10
    • 0346682717 scopus 로고    scopus 로고
    • Sun's SKIP Firewall Traversal for Mobile IP
    • RFC 2356
    • G. Montenegro and V. Gupta, "Sun's SKIP Firewall Traversal for Mobile IP," RFC 2356, 1998.
    • (1998)
    • Montenegro, G.1    Gupta, V.2
  • 11
    • 0031624875 scopus 로고    scopus 로고
    • Protecting data privacy in private information retrieval schemes
    • Online, Available
    • Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, "Protecting data privacy in private information retrieval schemes," in STOC '98, 1998, pp. 151-160. [Online]. Available: citeseer.ist.psu.edu/579393.html
    • (1998) STOC '98 , pp. 151-160
    • Gertner, Y.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 12
    • 48349140748 scopus 로고    scopus 로고
    • GNU Multiple Precision Arithmetic Library
    • GNU Multiple Precision Arithmetic Library, http:llwww.swox.com/gmp/.
  • 14
    • 0035278163 scopus 로고    scopus 로고
    • Algorithms for packet classification
    • P. Gupta and N. McKeown, "Algorithms for packet classification, " IEEE Network, vol. 15, no. 2, pp. 24-32, 2001.
    • (2001) IEEE Network , vol.15 , Issue.2 , pp. 24-32
    • Gupta, P.1    McKeown, N.2
  • 15
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in Proc. VLDB, 2004.
    • (2004) Proc. VLDB
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 18
    • 33645753514 scopus 로고    scopus 로고
    • A security scheme for protecting security policies in firewall
    • J. Lee, J. Jeon, and K. Yoo, "A security scheme for protecting security policies in firewall," SIGOPS Operating System Review, vol. 38, no. 2, pp. 69-72, 2004.
    • (2004) SIGOPS Operating System Review , vol.38 , Issue.2 , pp. 69-72
    • Lee, J.1    Jeon, J.2    Yoo, K.3
  • 20
    • 48349107147 scopus 로고    scopus 로고
    • OpenVPN
    • OpenVPN, http://openvpn.net/.
  • 21
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • S. Pohlig and M. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance," IEEE Transactions on Information Theory, vol. IT-24, pp. 106-110, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.IT-24 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 22
    • 84882957020 scopus 로고    scopus 로고
    • Firewall policy advisor for anomaly detection and rule editing
    • E. Shaer and H. Hamed, "Firewall policy advisor for anomaly detection and rule editing," in Proc. Integrated Management (IM), 2003.
    • (2003) Proc. Integrated Management (IM)
    • Shaer, E.1    Hamed, H.2
  • 23
    • 8344229907 scopus 로고    scopus 로고
    • Discovery of policy anomalies in distributed firewalls
    • E. Shaer and H. Hamed, "Discovery of policy anomalies in distributed firewalls," in Proc. IEEE INFOCOM, 2004.
    • (2004) Proc. IEEE INFOCOM
    • Shaer, E.1    Hamed, H.2
  • 25
    • 3142744801 scopus 로고    scopus 로고
    • On Diffie-Hellman key agreement with short exponents
    • P. van Oorschot and M. Wiener, "On Diffie-Hellman key agreement with short exponents," in Proc. Eurocrypt, 1996.
    • (1996) Proc. Eurocrypt
    • van Oorschot, P.1    Wiener, M.2
  • 26
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • A. Wool, "A quantitative study of firewall configuration errors," Computer, vol. 37, no. 6, pp. 62-67, 2004.
    • (2004) Computer , vol.37 , Issue.6 , pp. 62-67
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.