望麓自卑—湖南大学最具潜力的校园传媒

 找回密码
 注册

QQ登录

只需一步,快速开始

查看: 1738|回复: 0

[资源共享] Internet security: firewalls and beyond

[复制链接]
发表于 2006-9-18 13:36:22 | 显示全部楼层 |阅读模式
REFERENCES
Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.

1  Chapman, D. and Zwicky, E. Internet Security Firewalls. O'Reilly, Sebastopol, Calif., 1995.

2  William R. Cheswick , Steven M. Bellovin, Firewalls and Internet security: repelling the wily hacker, Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1994

3  IEEE. Local and Metropolitean Area Networks: Interoperable LAN/MAN Security (SILS). IEEE Std 802.10, 1990.

4  Stephen T. Kent, Internet Privacy Enhanced Mail, Communications of the ACM, v.36 n.8, p.48-60, Aug. 1993

5  Morris, R. A Weakness in the 4.2BSD UNIX TCP/IP Software. Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, N J, Feb. 1985.

6  Oppliger, R. Authentication and key distribution in computer networks and distributed systems. In Communications and M~ltimedia Security. R. Posch, Ed. Chapman & Hall, London, UK, 1995.

7  Rolf Oppliger, Internet Security Enters the Middle Ages, Computer, v.28 n.10, p.100-101, October 1995

8  Rolf Oppliger, Authentication Systems for Secure Networks, Artech House, Inc., Norwood, MA, 1996

9  Bruce Schneier, Applied cryptography (2nd ed.): protocols, algorithms, and source code in C, John Wiley & Sons, Inc., New York, NY, 1995

10  E. H. Spafford, Crisis and aftermath, Communications of the ACM, v.32 n.6, p.678-687, June 1989

11  Gene Tsudik, Message authentication with one-way hash functions, ACM SIGCOMM Computer Communication Review, v.22 n.5, p.29-38, Oct. 1992

12  D. A. Wagner , S. M. Bellovin, A \"bump in the stack\" encryptor for MS-DOS systems, Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96), p.155, February 22-23, 1996



CITINGS  8
Eric Ly, Distributed Java Applets for Project Management on the Web, IEEE Internet Computing, v.1 n.3, p.21-26, May 1997

Lorrie Faith Cranor, Internet privacy, Communications of the ACM, v.42 n.2, p.28-38, Feb. 1999

William Natale, TCP/IP and security software applications, The Journal of Computing in Small Colleges, v.16 n.3, p.205-211, March 2001

Alok Gupta , Y. Alex Tung , James R. Marsden, Digital signature: use and modification to achieve success in next generational e-business processes, Information and Management, v.41 n.5, p.561-575, May 2004

Robert N. Smith , Yu Chen , Sourav Bhattacharya, Cascade of Distributed and Cooperating Firewalls in a Secure Data Network, IEEE Transactions on Knowledge and Data Engineering, v.15 n.5, p.1307-1315, September 2003

Vijay V. Raghavan, Toward an integrative model of application-software security, Practicing software engineering in the 21st century, Idea Group Publishing, Hershey, PA, 2003

Susan J. Chinburg , Ramesh Sharda , Mark Weiser, Establishing the business value of network security using analytical hierarchy process, Creating business value with information technology: challenges and solutions, Idea Group Publishing, Hershey, PA, 2003

Rakesh Agrawal , Ramakrishnan Srikant, Privacy-preserving data mining, ACM SIGMOD Record, v.29 n.2, p.439-450, June 2000



INDEX TERMS
Primary Classification:
  H. Information Systems
  H.4 INFORMATION SYSTEMS APPLICATIONS
     H.4.3 Communications Applications

        Nouns: Internet


Additional Classification:
  C. Computer Systems Organization
  C.2 COMPUTER-COMMUNICATION NETWORKS
     C.2.0 General
        Subjects: Security and protection (e.g., firewalls)
     C.2.2 Network Protocols

        Nouns: TCP/IP

  D. Software
  D.4 OPERATING SYSTEMS

  E. Data




General Terms:
Algorithms, Languages, Security, Standardization



REVIEW

\"Matthew Allen Bishop\"

Two techniques for enhancing the security of systems connected to the Internet are presented. The first technique, the use of firewalls, is currently available and popular. The second, making changes to applications and protocol implementations, holds greater promise but is still being developed. This expository paper provides a good but shallow overview of the protocols and implementation issues. It focuses on the technical details but also touches on the political and social ramifications of introducing and maintaining security. The author's analogies in support of security are thought-provoking. The presentation of firewall technology is shorter and less satisfying. It describes the main types of firewalls and contrasts their advantages and disadvantages. The paper includes a number of frustrating minor errors. For example, the author states that “PGP conforms to most parts of the PEM specification” (p.100). This is inaccurate: PGP provides a functionality similar to that of Privacy Enhanced Mail, and uses the same fundamental idea of differing interchange and session keys, but the two are incompatible. To be fair, the paper correctly notes the major differences in the trust model. This paper provides a reasonable and readable survey, but leaves the reader wanting to know more.  Online Computing Reviews Service


Collaborative Colleagues: Rolf Oppliger: Andres Albanese
Riccardo Bettati
Martin Bracher
Andreas Greulich
Amit Gupta
Mark Moran
Ruedi Rytz
Peter Trachsel



Peer to Peer - Readers of this Article have also read:
Web application security assessment by fault injection and behavior monitoring Proceedings of the 12th international conference on World Wide Web
Yao-Wen Huang ,  Shih-Kun Huang ,  Tsung-Po Lin ,  Chung-Hung Tsai


Data structures for quadtree approximation and compression Communications of the ACM  28, 9
Hanan Samet


A hierarchical single-key-lock access control using the Chinese remainder theorem Proceedings of the 1992 ACM/SIGAPP Symposium on Applied computing
Kim S. Lee ,  Huizhu Lu ,  D. D. Fisher


Putting innovation to work: adoption strategies for multimedia communication systems Communications of the ACM  34, 12
Ellen Francik ,  Susan Ehrlich Rudman ,  Donna Cooper ,  Stephen Levine


The GemStone object database management system Communications of the ACM  34, 10
Paul Butterworth ,  Allen Otis ,  Jacob Stein

p92-oppliger.pdf

332 KB, 下载次数: 3

您需要登录后才可以回帖 登录 | 注册

本版积分规则

关闭

每日推荐上一条 /1 下一条

小黑屋|手机版|湖南大学望麓自卑校园传媒 ( 湘ICP备14014987号 )

GMT+8, 2024-11-27 22:07 , Processed in 0.103040 second(s), 20 queries , Gzip On.

Powered by Discuz! X3.4

Copyright © 2001-2020, Tencent Cloud.

快速回复 返回顶部 返回列表