메뉴 건너뛰기




Volumn , Issue , 2006, Pages 33-49

Designing Firewalls: A Survey

Author keywords

Designing firewalls DMZ (demilitarized zone) and external (untrusted) networks; Firewall classification; Firewall deployment management

Indexed keywords


EID: 84889389351     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/9780470099742.ch3     Document Type: Chapter
Times cited : (2)

References (21)
  • 1
    • 0003437009 scopus 로고
    • Firewalls and Internet Security: Repelling the Wily Hacker
    • Addison-Wesley, Reading, MA
    • W. R. Cheswick and S. M. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, Reading, MA, 1994.
    • (1994)
    • Cheswick, W.R.1    Bellovin, S.M.2
  • 2
    • 0004012340 scopus 로고
    • Serverless Network File Systems
    • PhD thesis, University of California, Berkeley, Dec.
    • M. Dahlin, Serverless Network File Systems, PhD thesis, University of California, Berkeley, Dec. 1995.
    • (1995)
    • Dahlin, M.1
  • 3
    • 84889335807 scopus 로고    scopus 로고
    • Using process infection to bypass windows software firewalls
    • Rattle Phrack, July
    • Rattle, Using process infection to bypass windows software firewalls. Phrack, 13(62), July 2004.
    • (2004) , vol.13 , Issue.62
  • 4
    • 34848822033 scopus 로고    scopus 로고
    • Distributed firewalls, login: magazine, special issue on security
    • Nov.
    • S. M. Bellovin, Distributed firewalls, login: magazine, special issue on security, Nov. 1999, pp. 37-39.
    • (1999) , pp. 37-39
    • Bellovin, S.M.1
  • 5
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • LNCS 1603, Springer-Verlag, New York
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The role of trust management in distributed systems security, in Secure Internet Programming, LNCS 1603, Springer-Verlag, New York, 1999, pp. 185-210.
    • (1999) Secure Internet Programming , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 8
    • 84889289899 scopus 로고    scopus 로고
    • CERT, Advisory CA-2003-04: MS-SQL server worm, Jan.
    • CERT, Advisory CA-2003-04: MS-SQL server worm, http://www.cert.org/advisories/CA-2003-04.html, Jan. 2003.
    • (2003)
  • 9
    • 84889376004 scopus 로고    scopus 로고
    • CERT, Advisory CA-2001-19: "Code red" worm exploiting buffer overflow in IIS Indexing Service DLL, July
    • CERT, Advisory CA-2001-19: "Code red" worm exploiting buffer overflow in IIS Indexing Service DLL, http://www.cert.org/advisories/CA-2001-19.html, July 2001.
    • (2001)
  • 11
    • 84962298764 scopus 로고    scopus 로고
    • Architecture and concepts of the ARGuE guard
    • Proceedings of the Fifteenth Annual Computer Security Applications Conference (ACSAC) Scotsdale, Dec.
    • J. Epstein, Architecture and concepts of the ARGuE guard, In Proceedings of the Fifteenth Annual Computer Security Applications Conference (ACSAC), Scotsdale, Dec. 1999.
    • (1999)
    • Epstein, J.1
  • 13
    • 0030644427 scopus 로고    scopus 로고
    • Filtering postures: Local enforcement for global policies
    • May, Oatland, CA
    • J. D. Guttman, Filtering postures: Local enforcement for global policies, in Proceedings of the IEEE Security and Privacy Conference, May 1997, Oatland, CA, pp. 120-129.
    • (1997) Proceedings of the IEEE Security and Privacy Conference , pp. 120-129
    • Guttman, J.D.1
  • 18
    • 0005008274 scopus 로고
    • Simple and flexible datagram access controls for UNIX-based gateways
    • Baltimore
    • J. C. Mogul, Simple and flexible datagram access controls for UNIX-based gateways, in Proceedings of the USENIX Summer 1989 Conference, 1989, Baltimore, pp. 203-221.
    • (1989) Proceedings of the USENIX Summer 1989 Conference , pp. 203-221
    • Mogul, J.C.1
  • 21
    • 85077745984 scopus 로고
    • TCP WRAPPER: Network monitoring, access control and booby traps
    • Baltimore
    • W. Venema, TCP WRAPPER: Network monitoring, access control and booby traps, in Proceedings of the Third USENIX UNIX Security Symposium, 1992, Baltimore, pp. 85-92.
    • (1992) Proceedings of the Third USENIX UNIX Security Symposium , pp. 85-92
    • Venema, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.