Sciweavers

1970 search results - page 2 / 394
» Security Without Firewalls
Sort
View
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
14 years 22 days ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
LISA
2007
13 years 8 months ago
PolicyVis: Firewall Security Policy Visualization and Inspection
Firewalls have an important role in network security. However, managing firewall policies is an extremely complex task because the large number of interacting rules in single or d...
Tung Tran, Ehab S. Al-Shaer, Raouf Boutaba
ACMSE
2009
ACM
14 years 24 days ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling
CSREASAM
2009
13 years 7 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
CSREASAM
2010
13 years 4 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...