REFERENCES

Team-Fly

  1. N. Doraswamy and D. Harkins, IPSec: The News Security Standard for the Internet, Intranets, and Virtual Private Networks, Prentice Hall PTR, Upper Saddle River, NJ, 1999.

  2. E. Kaufman and A. Neuman, Implementing IPSec: Making Security Work on VPNs, Intranets, and Extranets, John Wiley & Sons, New York, 1999.

  3. S. Frankel, Demystifying the IPsec Puzzle, Artech House, Norwood, MA, 2001.

  4. R. Nelson, "SDNS Services and Architecture," Proceedings of National Computer Security Conference, 1987, pp. 153-157.

  5. ISO/IEC 11577, Information Technology—Telecommunications and Information Exchange Between Systems—Network Layer Security Protocol, Geneva, Switzerland, 1993.

  6. J. Ioannidis and M. Blaze, "The Architecture and Implementation of Network-Layer Security Under Unix," Proceedings of the USENIX UNIX Security Symposium IV, October 1993, pp. 29–39.

  7. R. J. Atkinson, "Security Architecture for the Internet Protocol," Request for Comments 1825, August 1995.

  8. R. J. Atkinson, "IP Authentication Header," Request for Comments 1826, August 1995.

  9. R. J. Atkinson, "IP Encapsulating Security Payload," Request for Comments 1827, August 1995.

  10. P. Metzger and W. Simpson, "IP Authentication Using Keyed MD5," Request for Comments 1828, August 1995.

  11. P. Karn, P. Metzger, and W. Simpson, "The ESP DES-CBC Transform," Request for Comments 1829, August 1995.

  12. R. J. Atkinson, "Towards a More Secure Internet," IEEE Computer, Vol. 30, January 1997, pp. 57–61.

  13. R. Oppliger, "Security at the Internet Layer," IEEE Computer, Vol. 31, No. 9, September 1998, pp. 43–47.

  14. S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol," Request for Comments 2401, November 1998.

  15. S. Kent and R. Atkinson, "IP Authentication Header," Request for Comments 2402, November 1998.

  16. C. Madson and R. Glenn, "The Use of HMAC-MD5-96 Within ESP and AH," Request for Comments 2403, November 1998.

  17. C. Madson and R. Glenn, "The Use of HMAC-SHA-1-96 Within ESP and AH," Request for Comments 2404, November 1998.

  18. C. Madson and N. Doraswamy, "The ESP DES-CBC Cipher Algorithm with Explicit IV," Request for Comments 2405, November 1998.

  19. S. Kent and R. Atkinson, "IP Encapsulating Security Payload (ESP)," Request for Comments 2406, November 1998.

  20. R. Glenn and S. Kent, "The NULL Encryption Algorithm and Its Use with IPsec," Request for Comments 2410, November 1998.

  21. D. Piper, "The Internet IP Security Domain of Interpretation for ISAKMP," Request for Comments 2407, November 1998.

  22. D. Maughan, et al., "Internet Security Association and Key Management Protocol (ISAKMP)," Request for Comments 2408, November 1998.

  23. D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)," Request for Comments 2409, November 1998.

  24. R. Thayer and N. Doraswamy, "IP Security Document Roadmap," Request for Comments 2411, November 1998.

  25. S. M. Bellovin, "Problem Areas for the IP Security Protocols," Proceedings of the 6th USENIX Security Symposium, 1996, pp. 1–16.

  26. S. M. Bellovin, "Probable Plaintext Cryptanalysis of the IP Security Protocols," Proceedings of the Symposium on Network and Distributed System Security, 1997, pp. 155–160.

  27. M. Oehler and R. Glenn, "HMAC-MD5 IP Authentication with Replay Prevention," Request for Comments 2085, February 1997.

  28. P. C. Cheng, et al., "A Security Architecture for the Internet Protocol," IBM Systems Journal, Vol. 37, No. 1, 1998, pp. 42–60.

  29. G. Caronni, et al., "SKIP—Securing the Internet," Proceedings of WET ICE '96, Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, June 1996, pp. 62–67.

  30. P. Karn and W. Simpson, "Photuris: Session-Key Management Protocol," Request for Comments 2522, March 1999.

  31. P. Karn and W. Simpson, "Photuris: Extended Schemes and Attributes," Request for Comments 2523, March 1999.

  32. W. Diffie, P. C. van Oorshot, and M. J. Wiener, "Authentication and Authenticated Key Exchanges," Designs, Codes and Cryptography, Kluwer Academic Publishers, Norwell, MA, 1992, pp. 107–125.

  33. R. Oppliger, "Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks," Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security, September 1999, Kluwer Academic Publishers, Norwell, MA, pp. 163–175.

  34. H. Krawczyk, "SKEME: A Versatile Secure Key Exchange Mechanism for Internet," Proceedings of Internet Society Symposium on Network and Distributed System Security, February 1996.

  35. H. Orman, "The OAKLEY Key Determination Protocol," Request for Comments 2412, November 1998.

  36. R. Oppliger, "Internet Security: Firewalls and Beyond," Communications of the ACM, Vol. 40, No. 5, May 1997, pp. 92–102.

  37. D. McDonald, C. Metz, and B. Phan, "PF_KEY Key Management API, Version 2," Request for Comments 2367, July 1998.


Team-Fly


Internet and Intranet Security
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net