Author:
Rossberg Michael,Schaefer Guenter,Strufe Thorsten
Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Computer Networks and Communications,Hardware and Architecture,Information Systems
Reference27 articles.
1. Fu, Z., Wu, S.F.: Automatic generation of IPSec/VPN security policies in an intra-domain environment. In: Proceedings of the 12th internation workshop on Distributed System Operation and Management (DSOM), 2001, pp. 279–290
2. Baltatu, M., Lioy, A., Lombardo, D., Mazzocchi, D.: Towards a policy system for IPsec: issues and an experimental implementation. In: Proceedings of 9th IEEE International Conference on Networks (ICON), 2001, pp. 146–151
3. Sanchez, L.A., Condell, M.N.: Security policy protocol, Expired Internet-Draft. http://www.tools.ietf.org/html/draft-ietf-ipsp-spp-01 (2002)
4. Fluhrer, S.: Tunnel Endpoint Discovery, Expired Internet-Draft. http://www.tools.ietf.org/html/draft-fluhrer-ted-00 (2000)
5. Fluhrer, S.: Determining secure endpoints of tunnels in a network that uses internet security protocol, United States Patent US 2007/7207063 B1 (2007)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献