Browse > Article

BcN을 위한 secure QoS 및 보안 기술 동향  

전용희 (대구가톨릭대학교 컴퓨터정보통신공학부)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Allan J. Albrecht, Measuring application development, In Proc. of IBM Applications Development Joint SHARE/GUIDE Symposium, pp83-92, Monterey, CA, USA,1979
2 'Telecommunications and Internet Protocol Hannonization over Networks(TIPHON) Security; Threat Analysis', DTR/TIPHON - 08002 V0.1.9 (2001-02-09)
3 Jonna Bengtsson, Magnus Falk, 'Distributed Denial of Service', TDDC03 Information Security, May 6, 2003, Linkoeping University
4 B. Gamm, B. Howard, O. Paridaens, 'Security features required in an NGN', Alcatel Telecommunications Review, 2nd Quarter 2001, pp.l29-133
5 ITU-T X.80S Rec., Security architecture for systems providing end-to-end communications.
6 정보통신부 BcN 구축 기본 계획(2. 통합망 보안기능 고도화), pp. 76-83, 2004년 2월, 한국전산원
7 Richard Carlson, T. H. Dunigan, Russ Hobby, Harvey B. Newman, John P. Streck, Mladen A. Vouk, 'Strategies & Issues: Measuring End-to-End InternetPerformance',http://www.networkmagazine.com/shared/article/showArticle.jhtml? articleId=8703532
8 Cisco Systems, White Papers, Security of the MPLS Architecture, Cisco Systems Inc
9 Evdoxia Spyropoulou, Timothy E. Levin, and Cynthia E. Irvine, Calculating costs for quality of security service, In Proc. of the 16th Annual Computer Security Applications Conference, pp334-343, New Orleans, Louisiana, USA, Dec. 11-15, 2000
10 Stefan Lindskog, Erland Jonsson, 'Introducing Security m QoS Architectures'
11 Tsung-Li Wu, S. Felix Wu, Zhi Fu, He Huang, Feng-Min Gong, 'Securing QoS:Threats to RSVP Messages and their Countermeasures'
12 Ravi Sinha, MPLS-VPN Services and Security, GSEC Practical Ver l.4b, Option 1, SANS Institute 2003
13 A. Striegel, 'Security Issues in a Differentiated Services Internet'
14 M. Behringer, Analysis of the Security of BGP/MPLS IP VPNs, Internet Draft, Jan. 2004