메뉴 건너뛰기




Volumn , Issue , 1996, Pages 79-92

Designing an academic firewall: Policy, practice, and experience with SURF

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM FIREWALLS; WEB BROWSERS;

EID: 85034527162     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NDSS.1996.492415     Document Type: Conference Paper
Times cited : (20)

References (27)
  • 1
    • 85068093704 scopus 로고
    • Extending TCP for transactions
    • November
    • Braden, Bob. "Extending TCP for Transactions." Internet RFC 1379, November 1992.
    • (1992) Internet RFC , vol.1379
    • Bob, B.1
  • 2
    • 85036469181 scopus 로고
    • Vmtp: A transport protocol for the next generation of communication systems
    • Stowe, VT, August 1986. ACM SIGCOMM. Published as Computer Communications Review 16(3), October 1986
    • Cheriton, David R. "VMTP: A Transport Protocol for the Next Generation of Communication Systems." In Proceedings ofSIGCOMM 1986, Pages 406-415, Stowe, VT, August 1986. ACM SIGCOMM. Published as Computer Communications Review 16(3), October 1986.
    • (1986) Proceedings OfSIGCOMM , pp. 406-415
    • Cheriton David, R.1
  • 3
    • 85068047489 scopus 로고
    • Computer Emergency Response Team CERT Advisory CA: 90: 01, January
    • Computer Emergency Response Team. "Sun Sendmail Vulnerability." CERT Advisory CA:90:01, January 1990.
    • (1990) Sun Sendmail Vulnerability
  • 4
    • 85068090194 scopus 로고
    • Computer Emergency Response Team CERT Advisory CA: 93: 16, November
    • Computer Emergency Response Team. "Sendmail Vulnerability." CERT Advisory CA:93:16, November 1993.
    • (1993) Sendmail Vulnerability
  • 5
    • 3042944373 scopus 로고
    • Computer Emergency Response Team CERT Advisory CA-94: 01, February
    • Computer Emergency Response Team. "Ongoing Network Monitoring Attacks." CERT Advisory CA-94:01, February 1994.
    • (1994) Ongoing Network Monitoring Attacks
  • 6
    • 85068028756 scopus 로고
    • Computer Emergency Response Team CERT Advisory CA:94: 12, July
    • Computer Emergency Response Team. "Sendmail Vulnerabilities." CERT Advisory CA:94:12, July 1994.
    • (1994) Sendmail Vulnerabilities
  • 7
    • 77957944187 scopus 로고
    • Computer Emergency Response Team CERT Advisory CA: 95: 01, January
    • Computer Emergency Response Team. "IP Spoofing Attacks and Hijacked Terminal Connections." CERT Advisory CA:95:01, January 1995.
    • (1995) IP Spoofing Attacks and Hijacked Terminal Connections
  • 8
    • 85068034777 scopus 로고
    • Computer Emergency Response Team CERT Advisory CA: 95: 08, August
    • Computer Emergency Response Team. "Sendmail v.5 Vulnerability." CERT Advisory CA:95:08, August 1995.
    • (1995) Sendmail v.5 Vulnerability
  • 9
    • 85068095999 scopus 로고
    • Computer Emergency Response Team CERT Advisory CA: 95: 05, February
    • Computer Emergency Response Team. "Sendmail Vulnerabilities." CERT Advisory CA:95:05, February 1995.
    • (1995) Sendmail Vulnerabilities
  • 10
    • 85068087363 scopus 로고
    • Computer Emergency Response Team CERT Advisory CA: 95: 11, September
    • Computer Emergency Response Team. "Sun Sendmail-oR Vulnerability." CERT Advisory CA:95:11, September 1995.
    • (1995) Sun Sendmail-oR Vulnerability
  • 11
    • 34548192255 scopus 로고
    • Computer Emergency Response Team CERT Advisory CA: 95: 13, October
    • Computer Emergency Response Team. "Syslog Vulnerability-A Workaround for Sendmail." CERT Advisory CA:95:13, October 1995.
    • (1995) Syslog Vulnerability-A Workaround for Sendmail
  • 12
    • 0003735821 scopus 로고
    • Standard for the format of arpa internet text messages
    • August
    • Crocker, David H. "Standard For the Format of ARPA Internet Text Messages." Internet RFC 822, August 1982.
    • (1982) Internet RFC , vol.822
    • Crocker, D.H.1
  • 13
    • 85013607444 scopus 로고
    • A reliable multicast framework for light-weight sessions and application-level framing
    • Cambridge, MA, August 1995. ACM SIGCOMM. Published as Computer Communications Review 25(4), October 1995
    • Floyd, Sally, Van Jacobson, Charley Liu, Steven McCanne, and Lixia Zhang. "A Reliable Multicast Framework for Light-Weight Sessions and Application-Level Framing." In Proceedings of SIGCOMM 1995, Pages 342-356, Cambridge, MA, August 1995. ACM SIGCOMM. Published as Computer Communications Review 25(4), October 1995.
    • (1995) Proceedings of SIGCOMM , pp. 342-356
    • Floyd, S.1    Van Jacobson2    Liu, C.3    McCanne, S.4    Zhang, L.5
  • 15
    • 5744237348 scopus 로고
    • Guarding against internet intruders
    • February
    • Germain, Ellen. "Guarding Against Internet Intruders." Science, 267:608-610, February 1995.
    • (1995) Science , vol.267 , pp. 608-610
    • Germain, E.1
  • 17
    • 2542419686 scopus 로고
    • Transmission control protocol
    • Information Sciences Institute September
    • Information Sciences Institute. "Transmission Control Protocol." Internet RFC 793, September 1981.
    • (1981) Internet RFC , vol.793
  • 18
    • 3643099372 scopus 로고
    • The architecture and implementation of network-layer security under unix
    • Santa Clara, CA October USENIX Association
    • Ioannidis, J., M. Blaze. "The Architecture and Implementation of Network-Layer Security Under Unix." In UNIX Security Symposium IV Proceedings, Pages 29-39, Santa Clara, CA, October 1993. USENIX Association.
    • (1993) UNIX Security Symposium IV Proceedings , pp. 29-39
    • Ioannidis, J.1    Blaze, M.2
  • 19
    • 0003899818 scopus 로고
    • The kerberos network authentication service (v5)
    • September
    • Kohl, John and B. Clifford Neuman. "The Kerberos Network Authentication Service (V5)." Internet RFC 1510, September 1993.
    • (1993) Internet RFC , vol.1510
    • Kohl, J.1    Clifford Neuman, B.2
  • 20
    • 0003871309 scopus 로고
    • Network time protocol (version 3) specification, implementation
    • March
    • Mills, David L. "Network Time Protocol (version 3) Specification, Implementation." Internet RFC 1304, March 1992.
    • (1992) Internet RFC , vol.1304
    • Mills, D.L.1
  • 21
    • 0003757661 scopus 로고
    • Domain names-implementation and specification
    • November
    • Mockapetris, Paul V. "Domain Names-Implementation and Specification." Internet RFC 1035, November 1987.
    • (1987) Internet RFC , vol.1035
    • Mockapetris, P.V.1
  • 22
    • 0012359238 scopus 로고
    • Post office protocol-version 3
    • November
    • Myers, John G., Marshall T. Rose. "Post Office Protocol-Version 3." Internet RFC 1725, November 1994.
    • (1994) Internet RFC , vol.1725
    • Myers, J.G.1    Rose, M.T.2
  • 23
    • 0028514601 scopus 로고
    • Kerberos: Anau-thentication service for computer networks
    • September
    • Neuman, B.Clifford and Theodore Ts'o."Kerberos: AnAu-thentication Service for Computer Networks." IEEE Communications, 32(9):33-38, September 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Clifford, N.B.1    Tso, T.2
  • 25
    • 10644259086 scopus 로고
    • Rpc: Remote procedure call protocol specification: Version 2
    • Sun Microsystems Inc. June
    • Sun Microsystems, Inc. "RPC: Remote Procedure Call Protocol Specification: Version 2." Internet RFC 1057, June 1988.
    • (1988) Internet RFC , vol.1057
  • 26
    • 16244402839 scopus 로고
    • Nfs: Network file system specification
    • Sun Microsystems Inc. March
    • Sun Microsystems, Inc. "NFS: Network File System Specification." Internet RFC 1094, March 1989.
    • (1989) Internet RFC , vol.1094
  • 27
    • 30844455305 scopus 로고
    • Break-ins are rife: Survey suggests an epidemic of internet hacking
    • 9 Oct
    • Violino, Bob. "Break-Ins Are Rife: Survey Suggests an Epidemic of Internet Hacking." Information Week, 268:98, 9 Oct 1995.
    • (1995) Information Week , vol.268 , pp. 98
    • Violino, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.