Sciweavers

1358 search results - page 7 / 272
» Diverse Firewall Design
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
IMC
2005
ACM
15 years 5 months ago
Characterization and Measurement of TCP Traversal Through NATs and Firewalls
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Saikat Guha, Paul Francis
ISCC
2000
IEEE
100views Communications» more  ISCC 2000»
15 years 4 months ago
FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture
Ubiquitous communication will be one of the paradigms for the next decades. The use of the Internet in such applications demands for a highly reliable and secure system, especiall...
Stefan Mink, Frank Pählke, Günter Sch&au...
PAM
2012
Springer
13 years 7 months ago
SyFi: A Systematic Approach for Estimating Stateful Firewall Performance
Due to the lack of a standardized methodology for reporting firewall performance, current datasheets are designed for marketing and provide inflated throughput measurements obtai...
Yordanos Beyene, Michalis Faloutsos, Harsha V. Mad...
P2P
2008
IEEE
102views Communications» more  P2P 2008»
15 years 6 months ago
Free-Riding, Fairness, and Firewalls in P2P File-Sharing
Peer-to-peer file-sharing networks depend on peers uploading data to each other. Some peers, called free-riders, will not upload data unless there is an incentive to do so. Algor...
Jacob Jan-David Mol, Johan A. Pouwelse, Dick H. J....