Simplifying Access Control in Enterprise Networks
暂无分享,去创建一个
Lakshminarayanan Subramanian | John Lee | Dave Maltz | Scott Shenker | Cheng Tien Ee | S. Shenker | D. Maltz | C. Ee | L. Subramanian | John R. Lee
[1] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[2] Daniel P. W. Ellis,et al. Worms vs. perimeters: the case for hard-LANs , 2004, Proceedings. 12th Annual IEEE Symposium on High Performance Interconnects.
[3] Eddie Kohler,et al. The Click modular router , 1999, SOSP.
[4] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.
[5] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[6] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[7] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[8] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[9] Jason Lee,et al. A first look at modern enterprise traffic , 2005, IMC '05.
[10] Yakov Rekhter,et al. BGP/MPLS VPNs , 1999, RFC.
[11] Tal Garfinkel,et al. SANE: A Protection Architecture for Enterprise Networks , 2006, USENIX Security Symposium.
[12] Hong Yan,et al. A clean slate 4D approach to network control and management , 2005, CCRV.
[13] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[14] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM.
[15] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[16] Abhay Roy,et al. Multi-Topology (MT) Routing in OSPF , 2007, RFC.
[17] David Wetherall,et al. Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..