1 |
Jiejun Kong, Shirshanka Das, Edward Tsai, "A Decentralized and Localized Access Control System for Mobile Wireless Access to Secured Domains", Mario Gerla Computer Science Department University of California, Los Angeles, CA 90095, pp.51-60, 2003.
|
2 |
전정훈, 전상훈 "효율적인 네트워크 보안운영을 위한 Exclusive Firewall에 관한 연구", 한국컴퓨터정보학회논문지, 12(2), pp.93-102, 2007
|
3 |
전정훈 "인바운드 네트워크의 성능 및 보안성 향 상에 관한 연구" 한국통신학회논문지, 33(8), pp.727-734, 2008
|
4 |
Hazem Hamed, Ehab Al-Shaer and Will Marrero "Modeling and Verification of IPSec and VPN Security Policies" IEEE International Conference on Network Protocols, pp.259-278, 2005.
|
5 |
H. Garantla, Gemilkonakli "Evaluation of Firewall Effects on Network Performance" 2009.
|
6 |
Al-Shaer, E. Hamed, H. Boutaba, R. Hasan, "Conflict classification and analysis of distributed firewall policies", M. Telecommun. & Inf. Syst. DePaul Univ. Chicago IL USA, IEEE Journal, pp.2069-2084, Oct 2005.
|
7 |
HAYASHI yu-ichi "NAT Router Performance Evaluation", University of Aizu, Graduation Thesis, Mar, 2002.
|
8 |
Robert Richardson, CSI Director "CSI &FBI CSI Computer Crime & Security Survey" 2008.
|
9 |
Michael R. Lyu and Lorrien K. Y. "Firewall Security: Policies, Testing and Performance Evaluation", Lau Department of Computer Science and Engineering The Chinese University of Hong Kong, Shatin, HK IEEE Computer Society Washington DC USA, pp.116-121, 2000.
|
10 |
Jens Mache, Damon Tyman, Andre Pinter, Chris Allick "Performance Implication of Using VPN Technology for Cluster Integration and Grid Computing" IEEE Computer Society, pp.75-80, 2006.
|
11 |
한국정보보호진흥원 "2008년 인터넷 및 침해사 고 동향 및 분석보고 월보(8월)" Aug, 2008.
|