Sciweavers

1358 search results - page 4 / 272
» Diverse Firewall Design
Sort
View
77
Voted
CLEIEJ
1998
134views more  CLEIEJ 1998»
14 years 9 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
72
Voted
CARDIS
2006
Springer
101views Hardware» more  CARDIS 2006»
15 years 1 months ago
Smartcard Firewalls Revisited
Smartcards are being used as secure endpoints in computer transactions. Recently, the connectivity of smartcards has increased and future smartcards will be able to communicate ove...
Henrich Christopher Pöhls, Joachim Posegga
79
Voted
LISA
2007
14 years 12 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
50
Voted
CCS
1998
ACM
15 years 1 months ago
Design of a High-Performance ATM Firewall
Jun Xu, Mukesh Singhal