최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국SI학회지 = Journal of the Korea society of system integration, v.2 no.2, 2003년, pp.97 - 109
서희석 (성균관대학교 정보통신공학부) , 김동수 (국민대학교 BIT 대학원) , 김희완 (삼육대학교 컴퓨터과학과)
As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. And...
Wang Changkun, 'Policy-based Network Management,' Communication Technology Proceeding, WCC-ICCT 2000, International Conference on, Vol.1(Aug. 2000), pp.101-105
Verma, D. C., 'Simplifying Network Administration Using Policy-based Management,' Network, IEEE, Vol.16(March-April 2002), pp.20-26
B. P. Zeigler, 'Object-Oriented Simulation with Hierarchical,' Modular Models, USA:Academic Press, San Diego CA, 1990
Seo, Hee Suk , Cho, Tae Ho and Chi, Sung Do, 'Modeling and Simulation of Distributed Security Models,' Lecture Notes on Computer Science, Springer Verlag, LNCS 2660, (Jun. 2003), pp.809-818
NIST, An Introduction to Computer Security:The NIST Handbook, Technology Adminstration, U.S.A, 1995
M. Bishop, 'Vulnerablities Analysis,' Proceedings of the Recent Advances in Intrusion Detection, (Sep. 1999), pp.125-136
Robert A. Martin, 'Managing Vulnerabilities in Networked Systems,' IEEE Computer, Vol.34, No.11(Nov. 2001), pp.32-38
M. Stevens. 'Policy Framework,' Internet Draft, draft-ietf-policy-framework-05.txt, Sep. 1999
B. Moore, et al., 'Policy Core Information Model-Version 1 Specification,' IETF RFC 3060, Feb. 2000
B. Moore, et al., 'Policy Core Information Model (PCIM) Extensions,' IETF RFC 3460, Jan. 2003
http://icat.nist.gov, ICAT Metabase
R. Bace, Intrusion Detection, Macmillan Technical Publishing, 2000
E. D. Zwicky, S. Cooper and D. B. Chapman, Building Internet Firewalls, second edition, O’reilly & Associates, 2000
Zhengxin Chen, John Wiley & Sons, Data Mining And Uncertain Reasoning:An Integrated Approach, 2001
http://icat.nist.gov/icat.cfm?cvenameCVE-2000-0305
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.