{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:43:30Z","timestamp":1725543810269},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/hicss.2003.1174466","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"10 pp.","source":"Crossref","is-referenced-by-count":2,"title":["Revisiting the firewall abolition act"],"prefix":"10.1109","author":[{"given":"P.","family":"Robinson","sequence":"first","affiliation":[]},{"given":"J.","family":"Haller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"137","author":"anderson","year":"2001","journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems"},{"key":"ref38","article-title":"A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker","author":"goldberg","year":"1996","journal-title":"Proceedings of the 6th USENIX Security Symposium"},{"journal-title":"Security Assertion Markup Language (SAML)","year":"2002","author":"oasis","key":"ref33"},{"journal-title":"Celestia","year":"1999","author":"gong","key":"ref32"},{"journal-title":"Entrust Web Services Trust Framework","year":"2002","author":"entrust","key":"ref31"},{"journal-title":"CORBA Security","year":"2000","key":"ref30"},{"journal-title":"Ipsec IETF working group","year":"2002","author":"fraser","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/236387.236400"},{"key":"ref35","article-title":"The Case for IPv6","author":"king","year":"1999","journal-title":"Internet draft"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0034834"},{"journal-title":"Source PR Newswire","article-title":"Ernst & Young and Computer Associates Forge Alliance to Deliver World-Class Information Security and Risk Management Services","year":"2002","key":"ref10"},{"article-title":"Understanding Internet Security Risks","year":"1998","author":"cisco","key":"ref11"},{"journal-title":"HoneyNet Project Know Your Enemy Statistics","year":"2001","key":"ref12"},{"journal-title":"Avolio History Of Firewalls","year":"2000","key":"ref13"},{"journal-title":"Product Squid Web Proxy Cache","year":"2002","key":"ref14"},{"journal-title":"Ipv6 and Firewalls","year":"1996","author":"ellermann","key":"ref15"},{"key":"ref16","first-page":"37","article-title":"Distributed Firewalls","author":"bellovin","year":"1999"},{"key":"ref17","article-title":"Follow the Mellow Brick Road","author":"morrissey","year":"2001","journal-title":"Lucent Technical Material Network Computing Magazine"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1999.779758"},{"journal-title":"W3C Simple Object Access Protocol (SOAP)","year":"0","author":"box","key":"ref19"},{"journal-title":"XML Web Services Accelerates Current Trend in Enterprise Security","year":"2002","key":"ref28"},{"journal-title":"The history of communications and its implications for the Internet","year":"2000","author":"odlyzko","key":"ref4"},{"journal-title":"Personal Firewall Comparison","year":"2000","author":"richmond","key":"ref27"},{"journal-title":"An Evening with Berferd In Which a Cracker is Lured Endured and Studied","year":"1991","author":"cheswick","key":"ref3"},{"journal-title":"New Rules for the New Economy","year":"1998","author":"kelly","key":"ref6"},{"year":"1996","key":"ref29"},{"journal-title":"Mobile Wireless Computing Solutions and Challenges in Data Management","year":"1993","author":"imielinski","key":"ref5"},{"journal-title":"Thinking about Firewalls","year":"1994","author":"ranum","key":"ref8"},{"journal-title":"The Forrester Report Turning Security On Its Head","year":"1999","author":"julian","key":"ref7"},{"journal-title":"Internet Growth Statistics&#x201D; Statistics from numerous sources put together for Hobbes Internet Timeline","year":"1998","key":"ref2"},{"journal-title":"Final Report-2002 Annual HIMSS Leadership Survey","year":"2002","author":"lopez","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/253671.253741"},{"journal-title":"Comparison Shopping For Scalable Firewall Products","year":"2001","key":"ref20"},{"journal-title":"Encryption and Security Requirements for IETF Standard Protocols","year":"2001","author":"schiller","key":"ref22"},{"journal-title":"Freed RFC 2979-Behaviour Of And Requirements for Internet Firewalls","year":"2000","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s002870100194"},{"key":"ref23","article-title":"Web Services Security (WS-Security) Version 1.0","author":"atkinson","year":"2002","journal-title":"Copyright&#x00A9; 2002-2002 International Business Machines Corporation"},{"journal-title":"Open pluggable edge services","year":"2002","author":"rose","key":"ref26"},{"key":"ref25","article-title":"Worm","author":"kaspersky","year":"2002","journal-title":"Crawls into the KaZaA Network"}],"event":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","start":{"date-parts":[[2003,1,9]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2003,1,9]]}},"container-title":["36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8360\/26341\/01174466.pdf?arnumber=1174466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T03:26:29Z","timestamp":1489548389000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1174466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/hicss.2003.1174466","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}