Advertisement

Firewallsysteme und neue Sicherheitstechnologien im Internet

  • Kai Martius
Part of the DUD-Fachbeiträge book series (DUD)

Abstract

Die Internet-Protokolle wurden zunächst nicht unter Sicherheitsaspekten bezüglich Vertraulichkeit, Authentizität und Integrität der zu übertragenden Daten entwickelt, sondern das Augenmerk galt lediglich besonders hoher Ausfallsicherheit.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. [AH]
    Atkinson, R., “IP Authentication Header”, RFC 1826, NRL, August 1995.Google Scholar
  2. [ChesBello 94]
    Cheswiek, W., Bello win, S., Firewalls and Internet Security, Addison Wesley, Reading, Massachusetts, 1994Google Scholar
  3. [DNSSEC]
    Eastlake, D III., Kaufmann, C.W., “Domain Name System Security Extensions”, Work in Progess, draft-ietf-dnssec-secext-10.txt, August 1996Google Scholar
  4. [Eilermann 96]
    Uwe Ellermann, “‘IPv6 and Firewalls’”, Proceedings of ECURICOM - - -4th International Congress on Computer and Communications Security Protection, Paris, Juni 1996. http://www.fwl.dfn.de/eng/~ue/fw/ipv6fw/ Google Scholar
  5. [ESP]
    Atkinson, R., “IP Encapsulating Security Payload”, RFC 1827, NRL, August 1995.Google Scholar
  6. [IPSEC]
    Atkinson, R., “Security Architecture for IP”, RFC 1825, NRL, August 1995.Google Scholar
  7. [ISAKMP]
    Maughan, Schertler, Schneider, Turner, “Internet Security Association and Key Management Protokoll”, Work in Progress, draft-ietf-ipsec- isakmp-07.txt, Februar 1997Google Scholar
  8. [Kam]
    Karn, P. and B. Simpson, “The Photuris Session Key Management Protocol”, Internet-Draft: draft-simpson-photuris-1 l.txt, Work in Progress, Juni, 1996.Google Scholar
  9. [Oakley]
    Harkins, D., Carrel, D., “The resolution of ISAKMP with Oakley”, Work in Progress, draft-ietf-ipsec-isakmp-oakley-03.txt, Februar 1997Google Scholar
  10. [Schneier 96]
    Bruce Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, New York, NY, 1996Google Scholar
  11. [SOCKS]
    Leech M. et al., “SOCKS Protocol Version 5”, RFC 1928, März 1996Google Scholar
  12. [SSL]
    Freier et al., “The SSL-Protokoll Version 3”, Work in Progress, draftietf-tls-ssl-version3–00.txt, November 1996Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden 1997

Authors and Affiliations

  • Kai Martius
    • 1
  1. 1.Institut für Medizinische Informatik und BiometrieTU DresdenDeutschland

Personalised recommendations