Sciweavers

1358 search results - page 4 / 272
» Diverse Firewall Design
Sort
View
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 5 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
CARDIS
2006
Springer
101views Hardware» more  CARDIS 2006»
13 years 9 months ago
Smartcard Firewalls Revisited
Smartcards are being used as secure endpoints in computer transactions. Recently, the connectivity of smartcards has increased and future smartcards will be able to communicate ove...
Henrich Christopher Pöhls, Joachim Posegga
LISA
2007
13 years 8 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns