References


[1] Oppliger, R., Internet and Intranet Security, Second Edition , Norwood, MA: Artech House, 2002.

[2] Fraser, B., ˜ ˜Site Security Handbook, Request for Comments 2196, September 1997.

[3] Shirey, R., ˜ ˜Internet Security Glossary, Request for Comments 2828, May 2000.

[4] Cheswick, W. R., and S. M. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker , Reading, MA: Addison-Wesley, 1994.

[5] Cheswick, W. R., and S. M. Bellovin, ˜ ˜Network Firewalls, IEEE Communications Magazine , September 1994, pp. 50 “57.

[6] Siyan, K., and C. Hare, Internet Firewalls and Network Security , Indianapolis, IN: New Riders Publishing, 1995.

[7] Zwicky, E. D., et al., Building Internet Firewalls , 2nd Edition, Sebastopol, CA: O Reilly & Associates, 2000.

[8] Garfinkel, S., and G. Spafford, Practical UNIX and Internet Security , 2nd ed., Sebastopol, CA: O Reilly & Associates, 1996.

[9] Mogul, J. C., ˜ ˜Simple and Flexible Datagram Access Controls for UNIX-Based Gateways, Proceedings of the USENIX Summer Conference , 1989, pp. 203 “221.

[10] Cheswick, B., ˜ ˜The Design of a Secure Internet Gateway, Proceedings of the USENIX Summer Conference , 1990, pp. 233 “237.

[11] Ranum, M. J., ˜ ˜A Network Firewall, Proceedings of World Conference on System Administration Security , July 1992, pp. 153 “163.

[12] Chapman, D. B., ˜ ˜Network (In)Security Through IP Packet Filtering, Proceedings of USENIX UNIX Security Symposium III , September 1992, pp. 63 “76.

[13] Avolio, F., and M. J. Ranum, ˜ ˜A Network Perimeter with Secure Internet Access, Proceedings of the Internet Society Symposium on Network and Distributed System Security , February 1994, pp. 109 “119.

[14] Koblas, D., and M. R. Koblas, ˜ ˜SOCKS, Proceedings of USENIX UNIX Security III Symposium , September 1992, pp. 77 “82.

[15] Leech, M., et al., ˜ ˜SOCKS Protocol Version 5, Request for Comments 1928, March 1996.

[16] Leech, M., ˜ ˜Username/Password Authentication for SOCKS V5, Request for Comments 1929, March 1996.

[17] McMahon, P., ˜ ˜GSS-API Authentication Method for SOCKS Version 5, Request for Comments 1961, June 1996.

[18] Rigney, C., et al., ˜ ˜Remote Authentication Dial-In User Service (RADIUS), Request for Comments 2138, April 1997.

[19] Rigney, C., ˜ ˜RADIUS Accounting, Request for Comments 2139, April 1997.

[20] Finseth, C., ˜ ˜An Access Control Protocol, Sometimes Called TACACS, Request for Comments 1492, July 1993.

[21] Rekhter, Y., et al., ˜ ˜Address Allocation for Private Internets, Request for Comments 1918 (BCP 5), February 1996.

[22] Oppliger, R., ˜ ˜Internet Kiosk: Internet Security Enters the Middle Ages, IEEE Computer , Vol. 28, October 1995, pp. 100 “101.




Security Technologies for the World Wide Web
Security Technologies for the World Wide Web, Second Edition
ISBN: 1580533485
EAN: 2147483647
Year: 2003
Pages: 142
Authors: Rolf Oppliger

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net