Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Internet security standards: past, present, and future

Published: 01 June 1994 Publication History
First page of PDF

References

[1]
BOeZNS'nEIN, N., and FREED, N. 1992. MIME (Multipu~ Internet Mail Extensions): Mechanisms for Specifying and Describing the Format of Intemet Message Bodies, RFC 1341, June.]]
[2]
DATA COMMUNICATION NETWORKS 1988. Directory, Recommendations X.500-X. 521.]]
[3]
DEPARTMENT of DEFENSE. 1980. DoD Standard Internet Protocol, RFC 760, Jan.]]
[4]
GALVlN, J., MCCLOGHRIE, K, and DAVlN, J. 1992. SNMP Security Protocols, RFC 1352, July.]]
[5]
GALVIN, J. and MCCLOGHRIE K. 1993a. Administrative Model for Version 2 of the Simple Network Management Protocol (SNMPv2), RFC 1445, April.]]
[6]
GALV!N, J. and MCCLOGHRIE, K. 1993b. Security Protocols for Version 2 of the Simple Network Management Protocol (SNMPv2), RFC 1446, April.]]
[7]
INFORMATION TECHNOLOGY. 1987. Open System lnterconnection--Basic Reference Model, Part 2: Security Architecture. ISO 7498-2, Feb.]]
[8]
INFORMATION TECHNOLOGY. 1993. Open System lnterconnection--Network Layer Security Protocol. ISO/IEC 11577, Nov.]]
[9]
INTERNET ARCHITEC'TIIRE BOARD. 1994. The lnternet Standards Proce~v----Revision 2, RFC 1602, March.]]
[10]
KAUFMAN, C. 1993. DASS--Distributed Authentication Security Service, RFC 1507, Sept.]]
[11]
KENT, S. 1991. U.S. Department of Defense Security Options for the lntemet Protocol, RFC 1108, Nov.]]
[12]
KENT, S. 1993a. Architectural security. In lnternet S)~tem Handbook, Jan.]]
[13]
KE~rr, S. 1993b. Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Ba,zxl Key Management, RFC 1422, Feb.]]
[14]
KOHL, J. 1993. The Kerberos Authentication Service, RFC 1510, Sept.]]
[15]
LINN, J. 1987. Privacy Enhancement for Intemet Electronic Mail: Part l: Message Encipherment and Authentication Procedures, RFC 989, Feb.]]
[16]
LINN, J. 1993a. Privacy Enhancement for lnternet Electronic Mail: Part I: Message Encryption and Authentication Procedures, RFC 1421, Feb.]]
[17]
LINN, J. 1993b. Generic Security Service Application Program Interface, RFC 1508, Sept.]]
[18]
LLOYD, B. and SIM .P'~ON, W. 1992. PPP Authentication Protocols, RFC 1334, Oct.]]
[19]
LOITGHEED, K. AND REKHTER, Y. 1991. A Border Gateway Protocol 3 (BGP-3), RFC 1267, Oct.]]
[20]
Moy, J. 1994. OSPF Version 2, RFC 1583, March.]]
[21]
NELSON, R. 1987. SDNS,services and architecture. In Proceedings of the lOth National Computer Secur/(y Conference, Sept.]]
[22]
R{VEST, R. 1992. The MD5 Message Digest Algorithm, RFC 1321, April.]]
[23]
SIMP~SON, W. 1993. The Point-to-Point Protocol (PPP), RFC 1548, Dec.]]

Cited By

View all
  • (2005)A fully configurable secure environment for multimedia applicationsMultimedia Applications, Services and Techniques — ECMAST '9710.1007/BFb0037368(437-455)Online publication date: 25-Jun-2005
  • (2001)TCP/IP and security software applicationsProceedings of the seventh annual consortium for computing in small colleges central plains conference on The journal of computing in small colleges10.5555/374824.374781(205-211)Online publication date: 6-Apr-2001
  • (2001)TCP/IP and security software applicationsJournal of Computing Sciences in Colleges10.5555/374685.37478116:3(205-211)Online publication date: 1-Mar-2001
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image StandardView
StandardView  Volume 2, Issue 2
June 1994
63 pages
ISSN:1067-9936
EISSN:1557-7376
DOI:10.1145/202949
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 1994
Published in STANDARDVIEW Volume 2, Issue 2

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)55
  • Downloads (Last 6 weeks)15
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2005)A fully configurable secure environment for multimedia applicationsMultimedia Applications, Services and Techniques — ECMAST '9710.1007/BFb0037368(437-455)Online publication date: 25-Jun-2005
  • (2001)TCP/IP and security software applicationsProceedings of the seventh annual consortium for computing in small colleges central plains conference on The journal of computing in small colleges10.5555/374824.374781(205-211)Online publication date: 6-Apr-2001
  • (2001)TCP/IP and security software applicationsJournal of Computing Sciences in Colleges10.5555/374685.37478116:3(205-211)Online publication date: 1-Mar-2001
  • (2001)TCP/IP and security software applicationsProceedings of the twelfth annual CCSC South Central conference on The journal of computing in small colleges10.5555/374678.374781(205-211)Online publication date: 20-Apr-2001
  • (1998)Internet security: a case study of firewall selectionInformation Management & Computer Security10.1108/096852298102276586:4(178-184)Online publication date: Oct-1998

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media