-
1
-
-
0003437009
-
Firewalls and Internet Security: Repelling the Wily Hacker
-
Addison-Wesley, Reading, MA
-
W. R. Cheswick and S. M. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, Reading, MA, 1994.
-
(1994)
-
-
Cheswick, W.R.1
Bellovin, S.M.2
-
2
-
-
0004012340
-
Serverless Network File Systems
-
PhD thesis, University of California, Berkeley, Dec.
-
M. Dahlin, Serverless Network File Systems, PhD thesis, University of California, Berkeley, Dec. 1995.
-
(1995)
-
-
Dahlin, M.1
-
3
-
-
84889335807
-
Using process infection to bypass windows software firewalls
-
Rattle Phrack, July
-
Rattle, Using process infection to bypass windows software firewalls. Phrack, 13(62), July 2004.
-
(2004)
, vol.13
, Issue.62
-
-
-
4
-
-
34848822033
-
Distributed firewalls, login: magazine, special issue on security
-
Nov.
-
S. M. Bellovin, Distributed firewalls, login: magazine, special issue on security, Nov. 1999, pp. 37-39.
-
(1999)
, pp. 37-39
-
-
Bellovin, S.M.1
-
5
-
-
84982899264
-
The role of trust management in distributed systems security
-
LNCS 1603, Springer-Verlag, New York
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The role of trust management in distributed systems security, in Secure Internet Programming, LNCS 1603, Springer-Verlag, New York, 1999, pp. 185-210.
-
(1999)
Secure Internet Programming
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
7
-
-
0037731750
-
Drop-in security for distributed and portable computing elements
-
V. Prevelakis and A. D. Keromytis, Drop-in security for distributed and portable computing elements. Internet Research: Electronic Networking, Applications and Policy, 13(2), 2003, pp. 107-115.
-
(2003)
Internet Research: Electronic Networking, Applications and Policy
, vol.13
, Issue.2
, pp. 107-115
-
-
Prevelakis, V.1
Keromytis, A.D.2
-
8
-
-
84889289899
-
-
CERT, Advisory CA-2003-04: MS-SQL server worm, Jan.
-
CERT, Advisory CA-2003-04: MS-SQL server worm, http://www.cert.org/advisories/CA-2003-04.html, Jan. 2003.
-
(2003)
-
-
-
9
-
-
84889376004
-
-
CERT, Advisory CA-2001-19: "Code red" worm exploiting buffer overflow in IIS Indexing Service DLL, July
-
CERT, Advisory CA-2001-19: "Code red" worm exploiting buffer overflow in IIS Indexing Service DLL, http://www.cert.org/advisories/CA-2001-19.html, July 2001.
-
(2001)
-
-
-
10
-
-
0032643221
-
Firmato: A novel firewall management toolkit
-
May
-
Y. Bartal, A. Mayer, K. Nissim, and A. Wool, Firmato: A novel firewall management toolkit, in Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999, pp. 17-31.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
11
-
-
84962298764
-
Architecture and concepts of the ARGuE guard
-
Proceedings of the Fifteenth Annual Computer Security Applications Conference (ACSAC) Scotsdale, Dec.
-
J. Epstein, Architecture and concepts of the ARGuE guard, In Proceedings of the Fifteenth Annual Computer Security Applications Conference (ACSAC), Scotsdale, Dec. 1999.
-
(1999)
-
-
Epstein, J.1
-
12
-
-
85034527162
-
Designing an academic firewall. Policy, practice and experience with SURF
-
Feb., San Diego
-
M. Greenwald, S. K. Singhal, J. R. Stone, and D. R. Cheriton, Designing an academic firewall. Policy, practice and experience with SURF, in Proceedings of Network and Distributed System Security Symposium (NDSS), Feb. 1996, San Diego, pp. 79-91.
-
(1996)
Proceedings of Network and Distributed System Security Symposium (NDSS)
, pp. 79-91
-
-
Greenwald, M.1
Singhal, S.K.2
Stone, J.R.3
Cheriton, D.R.4
-
13
-
-
0030644427
-
Filtering postures: Local enforcement for global policies
-
May, Oatland, CA
-
J. D. Guttman, Filtering postures: Local enforcement for global policies, in Proceedings of the IEEE Security and Privacy Conference, May 1997, Oatland, CA, pp. 120-129.
-
(1997)
Proceedings of the IEEE Security and Privacy Conference
, pp. 120-129
-
-
Guttman, J.D.1
-
14
-
-
0034449536
-
Implementing a distributed firewall
-
Nov., Athens
-
S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith, Implementing a distributed firewall, in Proceedings of Computer and Communications Security (CCS) 2000, Nov. 2000, Athens, pp. 190-199.
-
(2000)
Proceedings of Computer and Communications Security (CCS) 2000
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.D.2
Bellovin, S.M.3
Smith, J.M.4
-
16
-
-
84874853845
-
A network of firewalls: An implementation example
-
Dec., New Orleans
-
B. McKenney, D. Woycke, and W. Lazear, A network of firewalls: An implementation example, in Proceedings of the Eleventh Anual Computer Security Applications Conference (ACSAC), Dec. 1995, New Orleans, pp. 3-13.
-
(1995)
Proceedings of the Eleventh Anual Computer Security Applications Conference (ACSAC)
, pp. 3-13
-
-
McKenney, B.1
Woycke, D.2
Lazear, W.3
-
17
-
-
85028466841
-
The packet filter: An efficient mechanism for user-level network code
-
Nov.
-
J. Mogul, R. Rashid, and M. Accetta, The packet filter: An efficient mechanism for user-level network code, in Proceedings of the Eleventh ACM Symposium on Operating Systems Principles, Nov. 1987, Austin, TX, pp. 39-51.
-
(1987)
Proceedings of the Eleventh ACM Symposium on Operating Systems Principles
, pp. 39-51
-
-
Mogul, J.1
Rashid, R.2
Accetta, M.3
-
18
-
-
0005008274
-
Simple and flexible datagram access controls for UNIX-based gateways
-
Baltimore
-
J. C. Mogul, Simple and flexible datagram access controls for UNIX-based gateways, in Proceedings of the USENIX Summer 1989 Conference, 1989, Baltimore, pp. 203-221.
-
(1989)
Proceedings of the USENIX Summer 1989 Conference
, pp. 203-221
-
-
Mogul, J.C.1
-
21
-
-
85077745984
-
TCP WRAPPER: Network monitoring, access control and booby traps
-
Baltimore
-
W. Venema, TCP WRAPPER: Network monitoring, access control and booby traps, in Proceedings of the Third USENIX UNIX Security Symposium, 1992, Baltimore, pp. 85-92.
-
(1992)
Proceedings of the Third USENIX UNIX Security Symposium
, pp. 85-92
-
-
Venema, W.1
|