期刊文献+

基于通信网络的安全研究 被引量:2

Research Security Based on Network
下载PDF
导出
摘要 该文分析了网络本身的安全机制,以及实现整个网络的安全机制等网络中安全设计的主要方面。还考虑在实际的环境中,根据安全需求提供了不同层次和级别的安全策略。 This article analyzes main aspects of safety in mobile network,including security mechanisms of whole network. And according to different security needs of users in reality, this articles provides different level of security mechanisms.
作者 李越
出处 《电脑知识与技术》 2009年第4X期3077-3078,共2页 Computer Knowledge and Technology
关键词 网络安全 终端控制 网络控制 安全管理 network security console control network control security management
  • 相关文献

参考文献4

二级参考文献20

  • 1[1]Next Generation Internet-priorities for action in migrating to the new Internet protocol IPv6[EB/OL]. http://www.ipv6tf.org/PublicDocuments/com2002-0096en01.pdf, 2002-02-21.
  • 2[2]Simple Internet Transition Mechanisms(SIT)[EB/OL]. http://playground.sun.com/pub/ipng/html/ipng-transition.html
  • 3[3]Gilligan R, Nordmark E. RFC 2893-2000, Transition mechanisms for IPv6 hosts and routers[S].
  • 4[4]Tsirtsis G, Srisuresh P. RFC 2766-2000, Network address translation-protocol translation (NAT-PT)[S].
  • 5[5]Durand A, Fasano P, Guardini I, Lento D. RFC 3053-2001, IPv6 tunnel broker[S].
  • 6[6]Carpenter B, Jung C. RFC 2529-1999, Transmission of IPv6 over IPv4 domains without explicit tunnels[S].
  • 7[7]Carpenter B, Moore K. RFC 3056-2001, Connection of IPv6 domains via IPv4 clouds[S].
  • 8[8]Tri Nguyen, Gerard Gastaud, Dirk Ooms. Connecting IPv6 domains across IPv4 clouds with BGP[Z]. Internet-Draft, draft-ietf-ngtrans-bgp-tunnel-04.txt,2002.
  • 9[9]Dupont F, Bound Jim, Alain Durand. Dual stack transition mechanism (DSTM)[Z]. Internet-Draft, 2002.
  • 10[10]Nordmark E. RFC 2765-2000, Stateless IP/ICMP translation algorithm (SIIT)[S].

共引文献49

同被引文献21

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部