Sciweavers

1486 search results - page 6 / 298
» Firewall Rules Analysis
Sort
View
SECURWARE
2008
IEEE
15 years 3 months ago
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have inconsistencies, allowing traffic that should be denied o...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...
CIIT
2007
133views Communications» more  CIIT 2007»
14 years 11 months ago
Linear-tree rule structure for firewall optimization
Given a list of filtering rules with individual hitting probabilities, it is known that the average processing time of a linear-search based firewall can be minimized by searchi...
Liang Zhao, A. Shimae, Hiroshi Nagamochi
SECRYPT
2008
80views Business» more  SECRYPT 2008»
14 years 11 months ago
A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Marti...
ICNP
2007
IEEE
15 years 3 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...
CHI
2010
ACM
15 years 4 months ago
Investigating an appropriate design for personal firewalls
Personal firewalls are an important aspect of security for home computer users, but little attention has been given to their usability. We conducted semi-structured interviews to ...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov,...