C.M. Wee, M.S. Beg, and B. Vaillant
[1] W. Stallings, SNMP, SNMPv2, SNMPv3, and RMON 1 and2 (Reading, MA: Addison-Wesley, 1999). [2] M. Rose & K. McCloghrie, Structure and identification ofmanagement information for TCP/IP-based Internets, RFC1155, May 1990. [3] J. Case, M. Fedor, & J.Davin, A Simple Network ManagementProtocol (SNMP), RFC 1098, May 1990. [4] U. Blementhal & B. Wijnen, User-based security model (USM)for version 3 of the Simple Network Management Protocol(SNMPv3), RFC 2574, April 1999. [5] B. Wijnen, R. Presuhn, & K. McCloghrie, View-based accesscontrol model (VACM) for the Simple Network ManagementProtocol (SNMP), RFC 2575, April 1999. [6] M. Rose, The simple book: An introduction to networkingmanagement (New Jersey: Prentice Hall, 1996). [7] C.M. Wee, B. Vaillant, & M. Salim Beg, Security for networkmanagement: Secure SetRequest for SNMP-APSSNMP, Proc.IASTED Int. Conf. on Internet and Multimedia Systems andApplications 2001, Honolulu, August 2001, 67–70. [8] W. Stallings, Network security essentials (New Jersey: PrenticeHall, 1999). [9] M.G. Gouda, Elements of network protocol design (New York:Wiley Interscience, 1998). [10] B. Schneier, Applied cryptography (New York: Wiley, 1996). [11] C.M. Wee, M. Salim Beg, & B. Vaillant, APSSNMP as a protocol for managing network appliances, Proc. 4th IEEE Int. Workshop on Networked Appliances, Gaithersburg, MD, October 2001, 87-96
Important Links:
Go Back