Security - Telenor
Security - Telenor
Security - Telenor
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
64<br />
References<br />
1 Abie, H. An Overview of Firewall Technologies.<br />
Telektronikk, 96 (2), 2000.<br />
2 Inprise’s VisiBroker Gatekeeper. Borland<br />
(1999, December 15) [online] – URL:<br />
http://www.borland.com/visibroker/gatekeeper/<br />
3 Lamperillo, G. Architecture of Distributed<br />
Object Firewall Proxy. NAI Labs, December<br />
30, 1999.<br />
4 IONA Technologies PLC. WonderWall<br />
Administrator’s Guide. IONA (1997, December<br />
10) [online] – URL: http://www.iona.<br />
com/<br />
5 NAI, Network Associates Labs. An ORB<br />
Gateway. NAI Labs (2000, June 20) [online]<br />
– URL: http://www.nai.com/<br />
6 NAI, Network Associates Labs. Object-Oriented<br />
Domain Type Enforcement (OO-<br />
DTE). NAI Labs (2000, June 19) [online] –<br />
URL: http://www.nai.com/ nai_labs/<br />
asp_set/applied/arse_corba.asp<br />
7 NAI, Network Associates Labs. Gauntlet 5.0<br />
for Unix, an IIOP proxy for Gauntlet. NAI<br />
Labs (2000, June 19) [online] – URL:<br />
http://www.nai.com/asp_set/products/tns/<br />
gauntletunix_intro.asp<br />
8 OMG. Joint Revised Submission,<br />
CORBA/Firewall <strong>Security</strong>+Errata. OMG<br />
Document. OMG (1998, July 6) [online] –<br />
URL: http://ftp.omg.org/pub/docs/orbos/<br />
98-07-03.pdf.<br />
9 OMG. The CORBA <strong>Security</strong> Service Specification<br />
(Revision 1.2). OMG (1998, January<br />
15) [online] – URL: http://ftp.omg.org/<br />
pub/docs/ptc/98-01-02.pdf.<br />
10 OMG. The Object Management Group.<br />
OMG (2000, June 19) [online] – URL:<br />
http://www.omg.org/<br />
11 Schreiner, R. CORBA Firewalls White<br />
Papers. TechnoSec Ltd. (1998, December 15)<br />
[online] – URL: http://www. technosec.com/<br />
whitepapers/corba/fw/main.html<br />
12 Schreiner, R. TIS plug-gw as a CORBA firewall<br />
White Papers. TechnoSec Ltd. (1998,<br />
December 15) [online] – URL: http://www.<br />
technosec.com/whitepapers/corba/<br />
tis_plug_gw/cfwexp1.html<br />
13 Schreiner, R. SOCKS as a CORBA firewall<br />
White Papers. TechnoSec Ltd. (1998,<br />
December 15) [online] – URL: http://www.<br />
technosec.com/whitepapers/corba/socks/<br />
socks_exp.html<br />
14 Schreiner, R. ObjectWall : Integrated Protection<br />
of Dynamic CORBA Applications.<br />
TechnoSec Ltd. (1998, December 15)<br />
[online] – URL: http://www.technosec.<br />
com/products/Objectwall.html<br />
15 SESAME, A Secure European System for<br />
Applications in a Multi-vendor Environment.<br />
SESAME (2000, June 19) [online] –<br />
URL: http://www.esat.kuleuven.ac.be/<br />
cosic/sesame/<br />
16 SOCKS V5. SOCKS (2000, June 19)<br />
[online] – URL: http://www.socks.nec.com/<br />
17 SSL3.0 Spec. Netscape Communications<br />
(2000, June 22) [online] – URL: http://<br />
home.netscape. com/eng/ssl3/3-SPEC.html<br />
18 Thompson, M J. Corporate Network <strong>Security</strong><br />
(1998, September 21) [online] – URL:<br />
http://www.thestandard.com.au/metrics/<br />
display/0,1283,750,00.html<br />
19 Warroom Study. <strong>Security</strong> in Cyberspace :<br />
Hearings before the Permanent Subcommittee<br />
on Investigations of the Committee on<br />
Governmental Affairs. United States Senate,<br />
104 th Congress, 2 nd Session, 1996. ISBN 0-<br />
16-053913-7. (http://www.warroomresearch.<br />
com/researchcollabor/infosecuritysurvey.<br />
htm)<br />
Telektronikk 3.2000