메뉴 건너뛰기




Volumn 173, Issue , 2005, Pages 203-218

A formal approach to specify and deploy a network security policy

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; COMPUTER SYSTEM FIREWALLS; FIRE FIGHTING EQUIPMENT; HIGH LEVEL LANGUAGES; SECURITY SYSTEMS; SEMANTICS;

EID: 84890861666     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-24098-5_15     Document Type: Conference Paper
Times cited : (47)

References (16)
  • 2
    • 84902496459 scopus 로고    scopus 로고
    • Checkpoint, In
    • Checkpoint (2004). Firewall-1. In http://www.checkpoint.com/.
    • (2004) Firewall-1
  • 9
    • 34548187500 scopus 로고    scopus 로고
    • Role Based Network Security Model: A Forward Step towards Firewall Management
    • In, Algiers
    • Hassan, A. and Hudec, L. (2003). Role Based Network Security Model: A Forward Step towards Firewall Management. In Workshop On Security of Information Technologies, Algiers.
    • (2003) Workshop On Security of Information Technologies
    • Hassan, A.1    Hudec, L.2
  • 15
    • 84902451125 scopus 로고    scopus 로고
    • In
    • Tsaousis, C. (2004). FireHOL, R5 VI. 159. In http://firehol.sourceforge.net/.
    • (2004) FireHOL, R5 VI , pp. 159
    • Tsaousis, C.1
  • 16


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.