Mazumdar, S. et al.; “Design of Protocol Independent Management Agent to Support SNMP and CMIP Queries”; Integrated Network Management III; Elsevier Science Publishers B.V. (North-Holland); Magazine, pp. 377-388, Dec. 1993.* |
Agha, G.A. et al.; “Modular heterogeneous system development: a critical anaysis of Java”, Proceedings of the Seventh Heterogeneous Computing Workshop; ISBN: 0-8186-8365—1; pp. 144-145, Mar. 1998.* |
Alexander, D.S. et al. “Active Bridging”, CIS Department, University of Pennsylvania, SIGCOMM, 1997, Cannes France; ACM 0-89791-905—x/97/0009. |
Tennenhouse, D.L. et al. “Towards an Active Network Architecture”, Computer Communication (1996), pp. 5-18. |
Tennenhouse, D.L. et al. “A survey of Active Network Research” IEEE Conference, Jan. 1997. |
Redscape, “Intelligent Management With Redscape Policy Framework” (1998). |
Redscape, “Solving IT Administration Problems With Open Policy Management” (1998). |
Blaze, et al., “Decentralized Trust Management”, IEEE Conference on Security and Privacy, May 1996. |
Simon, et al., “Adage: An Architecture for Distributed Authorization”, OSF Research Instittute, pp. 1-108, Dec. 2, 1996. |
Weissman, C., “Blacker: Security for the DDN Examples of A 1 Security Engineering Trades”, IEEE Symposium on Research and Privacy, pp. 286-292 (1992). |
Cobra Security, “The Administrator's Interfaces”, Cobra Security, pp. 135-159. |
Check Point Software Technologies, Ltd., “Security Platform Strategy”, www.checkpoint.com (1997). |
Instruction Manual, “Firewall-1; Managing Firewall-1 Using the OpenLook GUI”, User Guide Version 2.1, pp. 1.1-1.19. |
Guttman, J., “Filtering Postures: Local Enforcement for Global Policies”, Paper No. 1081-6011/97, IEEE, from the Proc. of the 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, pp. 120-129. |
“User's Guide: PC Firewall for Windows 3.1x Windows 95, and Windows NT”, McAfee, Inc., Santa Clara, CA, Oct. 1996, pp. 1-24. |
Check Point Software Technologies, Ltd., “Write Once, Manage Everything′Functionality to Enterprise Security Management”, http://www.checkpoint.com, Oct 1997. |
Check Point Software Tech., Ltd., “Open Security Manager Data Sheet”, http://www.checkpoint.com, (1998). |
Semeria, C., “Internet Firewalls and Security—A Technology Overview”, 3Com Corporation, Santa Clara, CA, pp. 1-16 (1996). |
Holbrook, P. et al., “Site Security Handbook” Request for Comments, RFC 1244, Jul. 1991, 90 pages, (http://www.cis.ohio-state.edu/htbin/rfc/rfc 1244.html). |