메뉴 건너뛰기




Volumn , Issue , 2001, Pages 71-82

Securing distributed adaptation

Author keywords

distributed adaptation; open architecture; security

Indexed keywords

COMPUTER ARCHITECTURE; NETWORK SECURITY;

EID: 84962166024     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/OPNARC.2001.916840     Document Type: Conference Paper
Times cited : (3)

References (28)
  • 1
    • 0032066141 scopus 로고    scopus 로고
    • A secure active network environment architecture: Realization in SwitchWare
    • May-June
    • D. S. Alexander, W. A. Arbaugh, A. D. Keromytis, and J. M. Smith, "A secure active network environment architecture: realization in SwitchWare," IEEE Network, Vol.12, No.3, May-June 1998.
    • (1998) IEEE Network , vol.12 , Issue.3
    • Alexander, D.S.1    Arbaugh, W.A.2    Keromytis, A.D.3    Smith, J.M.4
  • 2
    • 0008003913 scopus 로고    scopus 로고
    • Technical Report Dept of Computer Science, Princeton University, September
    • D. Balfanz and E. W. Felten, "A Java filter," Technical Report 567-97, Dept of Computer Science, Princeton University, September 1997.
    • (1997) A Java Filter
    • Balfanz, D.1    Felten, E.W.2
  • 4
    • 84962248491 scopus 로고    scopus 로고
    • Seraphim: Dynamic interoperable security architecture for active networks
    • Tel-Aviv, Israel, March
    • R. H. Campbell, Z. Liu, M. D. Mickunas, P. Naldurg, and S. Yi, "Seraphim: dynamic interoperable security architecture for active networks," IEEE OPENARCH 2000, Tel-Aviv, Israel, March 2000.
    • (2000) IEEE OPENARCH 2000
    • Campbell, R.H.1    Liu, Z.2    Mickunas, M.D.3    Naldurg, P.4    Yi, S.5
  • 10
    • 84872007983 scopus 로고
    • Information technology - Open systems interconnection - The directory: Authentication framework
    • International Telecommunication Union. "Information technology - open systems interconnection - the directory: authentication framework," ITU-T Recommendation X.509, 1995.
    • (1995) ITU-T Recommendation X.509
  • 11
    • 84962155476 scopus 로고    scopus 로고
    • Security issues for stateless programmable networks
    • panel session on security issues in programmable networks, New York, NY, March
    • A. W. Jackson, "Security issues for stateless programmable networks," panel session on security issues in programmable networks, IEEE OPENARCH 1999, New York, NY, March 1999.
    • (1999) IEEE OPENARCH 1999
    • Jackson, A.W.1
  • 13
    • 84962173482 scopus 로고    scopus 로고
    • IBM JDK 1.1.8. Available at http://www.ibm.com/java/jdk.
    • IBM JDK 1.1.8
  • 19
    • 84962165774 scopus 로고    scopus 로고
    • NAI Labs, Network Associates, July
    • S. Murphy, "Secure active network prototypes," NAI Labs, Network Associates, July 1997. Available at http://www.darpa.mil/ito/psum1999/G796-0.html.
    • (1997) Secure Active Network Prototypes
    • Murphy, S.1
  • 20
    • 0007999711 scopus 로고    scopus 로고
    • Design issues affecting security for active networks
    • panel session on security issues in programmable networks, New York, NY, March
    • S. Murphy, "Design issues affecting security for active networks," panel session on security issues in programmable networks, IEEE OPENARCH 1999, New York, NY, March 1999.
    • (1999) IEEE OPENARCH 1999
    • Murphy, S.1
  • 21
    • 73249134721 scopus 로고
    • Secure hash standard
    • 180-1, April
    • NIST (National Institute of Standards and Technology). "Secure hash standard," FIPS Publication, 180-1, April 1995. Also available at http://www.itl.nist.gov/fipspubs/fip180-1.htm.
    • (1995) FIPS Publication
  • 23
    • 4944258033 scopus 로고    scopus 로고
    • Automated planning for open architectures
    • Tel-Aviv, Israel, March
    • P. Reiher, R. Guy, M. Yarvis, and A. Rudenko, "Automated planning for open architectures," short paper presented at IEEE OPENARCH 2000, Tel-Aviv, Israel, March 2000.
    • (2000) IEEE OPENARCH 2000
    • Reiher, P.1    Guy, R.2    Yarvis, M.3    Rudenko, A.4
  • 24
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signature and public key cryptosystems," Communications of the ACM, Vol. 21, No. 2, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 26
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Dallas, TX, February
    • J. Steiner, C. Neuman, and J. Schiller, "Kerberos: an authentication service for open network systems," Proceedings of Usenix Winter Conference, pages 191-202, Dallas, TX, February 1988.
    • (1988) Proceedings of Usenix Winter Conference , pp. 191-202
    • Steiner, J.1    Neuman, C.2    Schiller, J.3
  • 28
    • 0004215022 scopus 로고    scopus 로고
    • Conductor: Distributed adaptation for complex networks
    • August
    • M. Yarvis, A. Wang, A. Rudenko, P. Reiher, and G. Popek. "Conductor: distributed adaptation for complex networks," UCLA Tech Report, CSD-TR-990042, August 1999. Available at: http://fmg-www.cs.ucla.edu/Conductor/CSD-TR-90042.ps.
    • (1999) UCLA Tech Report
    • Yarvis, M.1    Wang, A.2    Rudenko, A.3    Reiher, P.4    Popek, G.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.