{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T19:19:18Z","timestamp":1706815158116},"reference-count":21,"publisher":"Elsevier BV","issue":"13","license":[{"start":{"date-parts":[[1998,9,1]],"date-time":"1998-09-01T00:00:00Z","timestamp":904608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1998,9]]},"DOI":"10.1016\/s0140-3664(98)00173-x","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T12:08:03Z","timestamp":1027598883000},"page":"1107-1123","source":"Crossref","is-referenced-by-count":17,"title":["Internet\/Intranet firewall security\u2014policy, architecture and transaction services"],"prefix":"10.1016","volume":"21","author":[{"given":"Ray","family":"Hunt","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(98)00173-X_BIB1","unstructured":"C. Hare, K. Siyan, Internet Firewalls and Network Security, 2nd edition, New Riders Publishing, 1996, p. 128."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB2","doi-asserted-by":"crossref","unstructured":"W.R. Cheswick, S.M. Bellovin, Firewalls and Internet Security, 1994, pp. 54\u201374.","DOI":"10.1109\/35.312843"},{"key":"10.1016\/S0140-3664(98)00173-X_BIB3","unstructured":"National Computer Security Association (NCSA) Firewall Policy V 1.01, 1996. Internet: www.ncsa.com\/store."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB4","unstructured":"Public-Key Cryptography Standards, RSA Data Security, Inc., Version 1.5, 1993."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB5","unstructured":"G.B. White, Computer System and Network Security, CRC Press, 1996, pp. 9\u201321."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB6","unstructured":"F. Avolio, M. Ranum, A network perimeter with secure external access, Proc. Internet Society Symposium on Network and Distributed System Security, San Diego, 1994 (also available from ftp.tis.com as \/pub\/firewalls\/isoc94.ps.z)."},{"issue":"1","key":"10.1016\/S0140-3664(98)00173-X_BIB7","first-page":"40","article-title":"1996 Firewall Product Matrix","volume":"XII","year":"1996","journal-title":"Computer Security Journal"},{"key":"10.1016\/S0140-3664(98)00173-X_BIB8","doi-asserted-by":"crossref","unstructured":"W.R. Cheswick, S.M. Bellovin, Firewalls and Internet Security, 1994, pp. 51\u201352.","DOI":"10.1109\/35.312843"},{"key":"10.1016\/S0140-3664(98)00173-X_BIB9","unstructured":"D.B. Chapman, E.D. Zwicky, Building Internet Firewalls, O'Reilly and Associates, 1995, pp. 153\u2013154."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB10","unstructured":"C. Hare, K. Siyan, Internet Firewalls and Network Security, 2nd edition, New Riders Publishing, 1996, pp. 334\u2013335."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB11","unstructured":"Internet: anonymous FTP from ftp.nec.com:\/pub\/security\/socks.cstc."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB12","unstructured":"Virtual Private Networking over the Internet, Digital Equipment Corporation, White Paper, October 1995."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB13","unstructured":"Internet: Anonymous FTP from ftp:\/\/ftp.microsoft.com\/developr\/drg\/pptp, 1996."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB14","unstructured":"ITU Rec. X.509 (1993) | ISO\/IEC 9594-8: 1995, including Draft Amendment 1: Certificate Extensions (Version 3 certificate). Also available from: http:\/\/info.itu.ch\/itudoc\/itu-t\/rec\/x\/x500up\/s_x509_30222.html."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB15","unstructured":"Internet: http:\/\/home.netscape.com\/newsref\/ref\/128bit.html, 1996."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB16","unstructured":"Internet: www.sctc.com\/lockout\/HTML\/fortezza.html, 1996."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB17","doi-asserted-by":"crossref","unstructured":"S. Deering, R., Hinden, Internet Protocol, Version 6 (IPv6) Specification, IETF RFC 1883, 1995.","DOI":"10.17487\/rfc1883"},{"key":"10.1016\/S0140-3664(98)00173-X_BIB18","doi-asserted-by":"crossref","unstructured":"R. Atkinson, P. Metzger, Security Architecture for the Internet Protocol, RFCs 1825-9, 1995.","DOI":"10.17487\/rfc1825"},{"key":"10.1016\/S0140-3664(98)00173-X_BIB19","unstructured":"Internet: www.rsa.com\/rsalabs\/newfaq\/q173.html, 1997."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB20","unstructured":"Internet: Secure Electronic Transaction (SET) Specification, Version 1, 1997, www.mastercard.com\/set\/setdraft2, www.visa.com\/cgi-bin\/vee\/nt\/ecomm\/set\/main.html and www.setco.org."},{"key":"10.1016\/S0140-3664(98)00173-X_BIB21","unstructured":"Internet: www.rsa.com\/rsalabs\/newfaq\/q131.html, 1997."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S014036649800173X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S014036649800173X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T09:39:48Z","timestamp":1578476388000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S014036649800173X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,9]]},"references-count":21,"journal-issue":{"issue":"13","published-print":{"date-parts":[[1998,9]]}},"alternative-id":["S014036649800173X"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(98)00173-x","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1998,9]]}}}