Browse > Article

안전한 라우터를 위한 능동형 보안 엔진 구현  

김정녀 (한국전자통신연구원)
손승원 (한국전자통신연구원)
이철훈 (충남대학교 컴퓨터공학과)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 William R. Cheswick, Steven M. Bellovm Firewalls and Internet Security: Repelling the Willy hacker, Addison Wesley, 1994
2 J. G. Ko, J. N. Kim, & K. I. Jeong. "Access Control for Secure Free BSD Operating System," Proc.of WISA2001, The Second International Workshop on Information Security Applications, 2001.
3 Peter A. Loscocco, Wtephen D. Dmalley, Patric A. Muckelbauer Ruth C, Taylor, S. Jeff Truner, John F. Farrel. 'The Inevitability of Failure : The Flawed Assumption of Security in Modern Computing Environments', National Security Agency,1997.
4 DoD 5200.28-STD. 'Department of Defense Trusted Computer System Evaluation Criteria', December 1985
5 Dorothy E, Denning, 'Information Warfare and Security, Addisonwesley, April 1999.
6 S.H. Jo, J. N. Kim. & S. W. Sohn, "Design of Web-based Security Management for Intrusion Detection" Proc. of ICEB, ICEB '2002, 2002
7 Linux 2.4.18 Kernel-RELEASE Source Code
8 Chris Hare, Karanjit Siyan, Internet Firewalls and Network Security 2nd ed., New Readers, 1996.
9 B. H. Jung, J. N. Kim, 'Design of Dynamic Intrusion Detection Rule Modification Technique for Kernel Level Intrusion Detection.' 한국정보처리학회 추계학술대회 논문집, Vol. 9. No2, Nov. 2002
10 David F. Ferraiolo, Ravi Sandu, & Serban Gavrila, "A Proposed Standard for Role-Based Access Control," ACM transaction on Information and System Security, VOL.4, NO.3, pp.224-274 Aue 2001   DOI
11 An Introduction to Computer Security : The NIST Handbook, NIST Special Publication 800-12January 1
12 D. Brent Chapman, Elizabeth D. Zwicky, Building Internet Firewalls. O Reilly & Associations, Inc. January1996.
13 D. Ferraolo and R. Kuhn, 'Role-Based Access Control', Proceeding of the 15th National Computer Security Conference, 1992