Bell Labs Technical Journal

Cover image for Bell Labs Technical Journal

Special Issue: Network Security

Winter 2004

Volume 8, Issue 4

Pages 1–241

Issue edited by: Uma Chandrashekhar

  1. Editorial

    1. Top of page
    2. Editorial
    3. Research Article
    1. Overview (pages 1–5)

      Uma Chandrashekhar, Steven H. Richman and Rati C. Thanawala

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10099

  2. Research Article

    1. Top of page
    2. Editorial
    3. Research Article
    1. A framework for ensuring network security (pages 7–27)

      Andrew R. McGee, S. Rao Vasireddy, Chen Xie, David D. Picklesimer, Uma Chandrashekhar and Steven H. Richman

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10083

    2. An access control architecture for managing large-scale network applications (pages 29–38)

      Hemi Trickey and Alvin Barshefsky

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10084

    3. Reliability and security modeling in upgrading wireless backbone networks (pages 39–53)

      Chun K. Chan and Himanshu Pant

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10085

    4. Service intelligence through agile information controls (pages 61–70)

      Abdur Rahim Choudhary

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10087

    5. Authentication mechanisms for call control message integrity and origin verification (pages 71–91)

      Cynthia E. Martin and Jeffrey H. Dunn

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10088

    6. Adaptive VPN: Tradeoff between security levels and value-added services in virtual private networks (pages 93–113)

      Sampath Rangarajan, Anil Takkallapalli, Sarit Mukherjee, Sanjoy Paul and Scott Miller

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10089

    7. Intrusion detection in infrastructure wireless LANs (pages 115–119)

      Vivek Sharma

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10090

    8. Authorization mechanisms for mobile commerce implementations in enhanced prepaid solutions (pages 121–131)

      Yigang Cai, Jack Kozik, Helmut L. Raether, John B. Reid, Guy H. Starner, Sunil Thadani and Kumar V. Vemuri

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10091

    9. A network survivability model for critical national infrastructures (pages 153–172)

      David J. Houck, Eunyoung Kim, Gerard P. O'Reilly, David D. Picklesimer and Huseyin Uzunalioglu

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10093

    10. Formal modeling of vulnerability (pages 173–186)

      William L. Fithen, Shawn V. Hernan, Paul F. O'Rourke and David A. Shinberg

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10094

    11. Security posture for civilian and non-civilian networks (pages 187–202)

      Rao Vasireddy, Steven Wolter, Uma Chandrashekhar, Robert J. Thornberry Jr. and Andrew R. McGee

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10095

    12. Overview of data and telecommunications security standardization efforts in ISO, IEC, ITU, and IETF (pages 203–229)

      Herbert Bertine, Igor Faynberg and Hui-Lan Lu

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10096

    1. Recent Lucent technologies patents (pages 231–241)

      Version of Record online: 5 FEB 2004 | DOI: 10.1002/bltj.10097

SEARCH

SEARCH BY CITATION