Name-Level Approach for Egress Network Access Control
暂无分享,去创建一个
Yasushi Shinjo | Toshio Hirotsu | Kazuhiko Kato | Shinichi Suzuki | Kozo Itano | Kazuhiko Kato | Yasushi Shinjo | Shinichi Suzuki | Toshio Hirotsu | K. Itano
[1] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[2] Paul Resnick,et al. PICS: Internet access controls without censorship , 1996, CACM.
[3] Chris Vance,et al. The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 , 2003, USENIX Annual Technical Conference, FREENIX Track.
[4] Donald E. Eastlake,et al. DNS Request and Transaction Signatures ( SIG(0)s ) , 2000, RFC.
[5] Levon Esibov,et al. Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG) , 2003, RFC.
[6] Denis Pinkas,et al. The Simple and Protected GSS-API Negotiation Mechanism , 1998, RFC.
[7] Donald E. Eastlake,et al. Domain Name System Security Extensions , 1997, RFC.
[8] Donald E. Eastlake,et al. Secret Key Establishment for DNS (TKEY RR) , 2000, RFC.
[9] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[10] D. B. Davis,et al. Sun Microsystems Inc. , 1993 .
[11] Marcus Leech. Username/Password Authentication for SOCKS V5 , 1996, RFC.
[12] Matt Ganis,et al. SOCKS Protocol Version 5 , 1996, RFC.
[13] Kenzi Watanabe,et al. An User Authentication Gateway System with Simple User Interface, Low Administration Cost and Wide Applicability , 2001 .
[14] Brian Wellington,et al. Secret Key Transaction Authentication for DNS (TSIG) , 2000, RFC.