-
1
-
-
85008006486
-
Firewalls: An expert roundtable
-
Sept./Oct
-
J. P. Anderson, S. Brand, L. Gong, T. Haigh, S. Lipner, T. Lunt, R. Nelson, W. Neugent, H. Orman, M. Ranum, R. Schell, and E. Spafford. Firewalls: An expert roundtable. IEEE Software, 14(5):60-66, Sept./Oct. 1997
-
(1997)
IEEE Software
, vol.14
, Issue.5
, pp. 60-66
-
-
Anderson, J.P.1
Brand, S.2
Gong, L.3
Haigh, T.4
Lipner, S.5
Lunt, T.6
Nelson, R.7
Neugent, W.8
Orman, H.9
Ranum, M.10
Schell, R.11
Spafford, E.12
-
2
-
-
85084164023
-
A comparison of methods for implementing adaptive security policies
-
Berkeley Jan.26-29. Usenix Association
-
M. Carney and B. Loe. A comparison of methods for implementing adaptive security policies. In Proceedings of the 7th USENIX Security Symposium (SECURITY-98), pages 1-14, Berkeley, Jan.26-29 1998. Usenix Association
-
(1998)
Proceedings of the 7th USENIX Security Symposium (SECURITY-98
, pp. 1-14
-
-
Carney, M.1
Loe, B.2
-
4
-
-
84940117344
-
-
Check Point FireWall-1 version 3.0. White paper June
-
Check Point FireWall-1, version 3.0. White paper, June 1997. http://www.checkpoint.com/products/whitepapers/wp30.pdf
-
(1997)
-
-
-
6
-
-
84940117345
-
-
Ciscos PIX firewall series and stateful firewall security White paper
-
Ciscos PIX firewall series and stateful firewall security. White paper, 1997. http://www.cisco.com/warp/public/751/pix/nat wp.pdf
-
(1997)
-
-
-
7
-
-
84940117346
-
-
SOLsoft white paper
-
A. Fremont. Net Partitioner 3.1. SOLsoft white paper, 1998. http://www.solsoft.com/np/whitepapernplet.pdf
-
(1998)
Net Partitioner 3.1
-
-
Fremont, A.1
-
10
-
-
0030644427
-
Filtering postures: Local enforcement for global policies
-
Oakland, CA
-
J. D. Guttman. Filtering postures: Local enforcement for global policies. In Proc. IEEE Symp. on Security and Privacy, Oakland, CA, 1997
-
(1997)
Proc IEEE Symp. on Security and Privacy
-
-
Guttman, J.D.1
-
11
-
-
84940106654
-
Whats beyond firewalls?
-
Nov
-
C. D. Howe, B. Erwin, C. Barth, and S. Elliot. Whats beyond firewalls? The Forrester Report, 10(12), Nov. 1996
-
(1996)
The Forrester Report
, vol.10
, Issue.12
-
-
Howe, C.D.1
Erwin, B.2
Barth, C.3
Elliot, S.4
-
12
-
-
0002436227
-
High speed policy-based packet forwarding using efficient multi-dimensional range matching
-
Vancouver, BC, Canada
-
T. V. Lakshman and D. Stiliadis. High speed policy-based packet forwarding using efficient multi-dimensional range matching. In Proc. ACM SIGCOMM, Vancouver, BC, Canada, 1998
-
(1998)
Proc. ACM SIGCOMM
-
-
Lakshman, T.V.1
Stiliadis, D.2
-
13
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
Nov
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Trans. Computer Systems, 10(4):265-310, Nov. 1992
-
(1992)
ACM Trans. Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
14
-
-
84940117347
-
-
Lucent managed firewall, version 2.0 White paper
-
Lucent managed firewall, version 2.0. White paper, 1998. http://www.lucent.com/iss/pdf download/lmf technical.pdf
-
(1998)
-
-
-
16
-
-
19344364618
-
Role-based access control
-
In M. Zerkowitz, editor Academic Press
-
R. S. Sandhu. Role-based access control. In M. Zerkowitz, editor, Advances in Computers, volume 48. Academic Press, 1998
-
(1998)
Advances in Computers
, vol.48
-
-
Sandhu, R.S.1
-
17
-
-
0002798554
-
Fast scalable algorithms for level four switching
-
Vancouver, BC, Canada
-
V. Srinivasan, G. Varghese, S. Suri, andM. Waldvogel. Fast scalable algorithms for level four switching. In Proc. ACM SIGCOMM, Vancouver, BC, Canada, 1998
-
(1998)
Proc. ACM SIGCOMM
-
-
Srinivasan, V.1
Varghese, G.2
Suri, S.3
Waldvogel, M.4
-
18
-
-
84940117348
-
-
The Protocols Addison-Wesley
-
W. R. Stevens. TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, 1994
-
(1994)
TCP/IP Illustrated
, vol.1
-
-
Stevens, W.R.1
|