Secure SetRequest and GetResponse for SNMP: APSSNMP

C.M. Wee, M.S. Beg, and B. Vaillant

References

  1. [1] W. Stallings, SNMP, SNMPv2, SNMPv3, and RMON 1 and2 (Reading, MA: Addison-Wesley, 1999).
  2. [2] M. Rose & K. McCloghrie, Structure and identification ofmanagement information for TCP/IP-based Internets, RFC1155, May 1990.
  3. [3] J. Case, M. Fedor, & J.Davin, A Simple Network ManagementProtocol (SNMP), RFC 1098, May 1990.
  4. [4] U. Blementhal & B. Wijnen, User-based security model (USM)for version 3 of the Simple Network Management Protocol(SNMPv3), RFC 2574, April 1999.
  5. [5] B. Wijnen, R. Presuhn, & K. McCloghrie, View-based accesscontrol model (VACM) for the Simple Network ManagementProtocol (SNMP), RFC 2575, April 1999.
  6. [6] M. Rose, The simple book: An introduction to networkingmanagement (New Jersey: Prentice Hall, 1996).
  7. [7] C.M. Wee, B. Vaillant, & M. Salim Beg, Security for networkmanagement: Secure SetRequest for SNMP-APSSNMP, Proc.IASTED Int. Conf. on Internet and Multimedia Systems andApplications 2001, Honolulu, August 2001, 67–70.
  8. [8] W. Stallings, Network security essentials (New Jersey: PrenticeHall, 1999).
  9. [9] M.G. Gouda, Elements of network protocol design (New York:Wiley Interscience, 1998).
  10. [10] B. Schneier, Applied cryptography (New York: Wiley, 1996).
  11. [11] C.M. Wee, M. Salim Beg, & B. Vaillant, APSSNMP as a protocol for managing network appliances, Proc. 4th IEEE Int. Workshop on Networked Appliances, Gaithersburg, MD, October 2001, 87-96

Important Links:

Go Back