Asian Journal of Information Technology

Year: 2014
Volume: 13
Issue: 9
Page No. 446 - 453

Functioning Aspects of Secure Network and Design of Log Analyser

Authors : S. Manikandan, R. Prabhu , D. Sureshbabu and P. Vijayanand

References

Alam, M.M. and C.E. Smith, 2001. A scalar network analyzer based on detector-log amplifier RFIC chips. Proceedings of the IEEE SoutheastCon, 30 March-1-April, 2001, Clemson, SC., pp: 283-291.

Bommepally, K., T.K. Glisa, J.J. Prakash, S.R. Singh and H.A. Murthy, 2010. Internet activity analysis through proxy log. Proceedings of the National Conference on Communications, January 29-31, 2010, Chennai, pp: 1-5.

Boneh, D. and M. Franklin, 2001. Identity-based encryption from the weil pairing. Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, August 19-23, 2001, Santa Barbara, CA., USA., pp: 213-219.

Boneh, D., B. Lynn and H. Shacham, 2001. Short Signatures from the Weil Pairing, Advances in Cryptology-Asiacrypt' 2001. Springer-Verlag, Berlin, Heidelberg, pp: 514-532.

Boneh, D., C. Gentry, B. Lynn and H. Shacham, 2003. A survey of two signature aggregation techniques. RSA Cryptobytes, 6: 1-10.
Direct Link  |  

Boneh, D., C. Gentry, B. Lynn and H. Shacham, 2003. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Advance in Cryptology-Eurocrypt, Biham, E. (Ed.). Springer-Verlag, Berlin, Heidelberg, pp: 416-432.

Falcone, R. and C. Castelfranchi, 2001. The human in the loop of a delegated agent: The theory of adjustable social autonomy. IEEE Trans. Syst. Man Cybern. Part A: Syst. Humans, 31: 406-418.
CrossRef  |  

Ferraiolo, D.F., R. Sandhu, S. Gavrila, D.R. Kuhn and R. Chandramouli, 2001. Proposed NIST standard for role-based access control. ACM Trans. Inform. Syst. Secur., 4: 224-274.
CrossRef  |  Direct Link  |  

Gentry, C., 2003. Certificate-based encryption and the certificate revocation problem. Comput. Sci., 2656: 272-293.
CrossRef  |  Direct Link  |  

Gunther, C.G., 1990. An identity-based key exchange protocol. Proceedings of the EUROCRYPT'89, LNCS 434, April 10-13, 1990, Houthalen, Belgium, pp: 29-37.

Lysyanskaya, A., S. Micali and L. Reyzin and H. Shacham, 2004. Sequential aggregate signatures from trapdoor permutations. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, May 2-6, 2004, Interlaken, Switzerland, pp: 74-90.

Nagaratnam, N. and D. Lea, 1998. Secure delegation for distributed object environments. Proceedings of the 4th USENIX Conference on Object-Oriented Technologies and Systems, April 27-30, 1998, Santa Fe, New Mexico, pp: 101-115.

Naor, M. and K. Nissim, 1998. Certificate revocation and certificate update. Proceedings of the 7th USENIX Security Symposium, January 26-29, 1998, San Antonio, Texas, pp: 217-228.

Nehinbe, J.O., 2010. Log analyzer for network forensics and incident reporting. Proceedings of the International Conference on Intelligent Systems, Modelling and Simulation (ISMS), January 27-29, 2010, Liverpool, pp: 356-361.

Neuman, B.C., 1993. Proxy-based authorization and accounting for distributed systems. Proceedings the 13th International Conference on Distributed Computing Systems, May 25-28, 1993, Pittsburgh, PA., pp: 283-291.

Parasuraman, R., S. Galster, P. Squire, H. Furukawa and C. Miller, 2005. A flexible delegation-type interface enhances system performance in human supervision of multiple robots: Empirical studies with RoboFlag. IEEE Trans. Syst. Man Cybernet.-Part A: Syst. Hum., 35: 481-493.
CrossRef  |  

Rivest, R.L., A. Shamir and L. Adleman, 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM., 21: 120-126.
CrossRef  |  Direct Link  |  

Schnorr, C., 1991. Efficient signature generation by smart cards. J. Cryptol., 4: 161-174.
CrossRef  |  Direct Link  |  

Shehab, M., E. Bertino and A. Ghafoor, 2005. Secure collaboration in mediator-free environments. Proceedings of the 12th ACM Conference on Computer and Communications Security, November 7-10, 2005, Alexandria, VA., USA., pp: 58-67.

Sollins, K.R., 1988. Cascaded authentication. Proceedings of the IEEE Symposium on Security and Privacy, April 18-21, 1988, Oakland, CA., pp: 156-163.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved