[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
RFC3013: Recommended Internet Service Provider Security Services and Procedures2000 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 November 2000
Reflects downloads up to 19 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

The purpose of this document is to express what the engineering community as represented by the IETF expects of Internet Service Providers (ISPs) with respect to security.

RFC Downloads

Cited By

  1. ACM
    Naylor D, Mukerjee M and Steenkiste P (2014). Balancing accountability and privacy in the network, ACM SIGCOMM Computer Communication Review, 44:4, (75-86), Online publication date: 25-Feb-2015.
  2. ACM
    Gilad Y and Herzberg A (2014). Off-Path TCP Injection Attacks, ACM Transactions on Information and System Security (TISSEC), 16:4, (1-32), Online publication date: 1-Apr-2014.
  3. Xia Y and Yeo C (2014). Mobile Internet access over intermittent network connectivity, Journal of Network and Computer Applications, 40:C, (126-138), Online publication date: 1-Apr-2014.
  4. ACM
    Naylor D, Mukerjee M and Steenkiste P Balancing accountability and privacy in the network Proceedings of the 2014 ACM conference on SIGCOMM, (75-86)
  5. ACM
    Gilad Y and Herzberg A (2013). Fragmentation Considered Vulnerable, ACM Transactions on Information and System Security, 15:4, (1-31), Online publication date: 1-Apr-2013.
  6. ACM
    Gilad Y and Herzberg A When tolerance causes weakness Proceedings of the 22nd international conference on World Wide Web, (435-446)
  7. ACM
    Gilad Y and Herzberg A (2012). LOT, ACM Transactions on Information and System Security, 15:2, (1-30), Online publication date: 1-Jul-2012.
  8. Gilad Y and Herzberg A Spying in the dark Proceedings of the 12th international conference on Privacy Enhancing Technologies, (100-119)
  9. Koivunen E "Why wasn't i notified?" Proceedings of the 15th Nordic conference on Information Security Technology for Applications, (55-70)
  10. ACM
    Ehrenkranz T and Li J (2009). On the state of IP spoofing defense, ACM Transactions on Internet Technology (TOIT), 9:2, (1-29), Online publication date: 1-May-2009.
  11. ACM
    Xie Y, Yu F and Abadi M De-anonymizing the internet using unreliable IDs Proceedings of the ACM SIGCOMM 2009 conference on Data communication, (75-86)
  12. ACM
    Xie Y, Yu F and Abadi M (2009). De-anonymizing the internet using unreliable IDs, ACM SIGCOMM Computer Communication Review, 39:4, (75-86), Online publication date: 16-Aug-2009.
  13. ACM
    Andersen D, Balakrishnan H, Feamster N, Koponen T, Moon D and Shenker S (2008). Accountable internet protocol (aip), ACM SIGCOMM Computer Communication Review, 38:4, (339-350), Online publication date: 1-Oct-2008.
  14. ACM
    Andersen D, Balakrishnan H, Feamster N, Koponen T, Moon D and Shenker S Accountable internet protocol (aip) Proceedings of the ACM SIGCOMM 2008 conference on Data communication, (339-350)
  15. ACM
    Marchetti M and Colajanni M Adaptive traffic filtering for efficient and secure IP-mobility Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks, (43-50)
  16. Chen R, Park J and Marchany R (2007). A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks, IEEE Transactions on Parallel and Distributed Systems, 18:5, (577-588), Online publication date: 1-May-2007.
  17. ACM
    Bremler-Barr A and Levy H Brief announcement Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing, (375-375)
Contributors
  • Amazon.com, Inc.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations