Sciweavers

1358 search results - page 4 / 272
» Diverse Firewall Design
Sort
View
90
Voted
CLEIEJ
1998
134views more  CLEIEJ 1998»
14 years 11 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
82
Voted
CARDIS
2006
Springer
101views Hardware» more  CARDIS 2006»
15 years 3 months ago
Smartcard Firewalls Revisited
Smartcards are being used as secure endpoints in computer transactions. Recently, the connectivity of smartcards has increased and future smartcards will be able to communicate ove...
Henrich Christopher Pöhls, Joachim Posegga
92
Voted
LISA
2007
15 years 2 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
56
Voted
INFOCOM
2006
IEEE
15 years 5 months ago
Parallel Firewall Designs for High-Speed Networks
Errin W. Fulp
56
Voted
CCS
1998
ACM
15 years 3 months ago
Design of a High-Performance ATM Firewall
Jun Xu, Mukesh Singhal