Blaze, et al., "Decentralized Trust Management", IEEE Conference on Security and Privacy, May 1996. |
Simon, et al., "Adage: An Architecture for Distributed Authorization", OSF Research Institute,pp. 1-108, Dec.2, 1996. |
Weissman, C., "Blacker: Security for the DDN Examples of A1 Security Engineering Trades", IEEE Symposium on Research and Privacy, pp. 286-292 (1992). |
Cobra Security, "The Administrator's Interfaces", Cobra Security, pp. 135-159. |
Check Point Software Technologies Ltd., "Security Platform Strategy", www.checkpoint.com (1997). |
Instruction Manual, "Firewall-1; Managing Firewall-1 Using the OpenLook GUI", User Guide Version 2.1, pp. 1.1-1.19. |
Check Point Software Technologies Ltd. "`Write Once, Manage Everything` Functionality to Enterprise Security Management", http://www.checkpoint.com, Oct. 1997. |
Check Point Software Technologies Ltd., "Open Security Manager Data Sheet", http://www.checkpoint.com, 1998. |
Guttman, Joshua D., "Filtering Postures: Local Enforcement for Global Policies", Paper No. 1081-6011/97, IEEE, from the Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, May 4-7, 1997, pp. 120-129. |
"User's Guide: PC Firewall for Windows 3.1x, Windows 95, and Windows NT", McAfee, Inc., Santa Clara, California, Oct. 1996, pp. 1-24. |