Firewalls from double purity

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Midpoints Versus Endpoints: From Protocols to Firewalls

Today’s protocol specifications only define the behaviour of principals representing communication endpoints. But in addition to endpoints, networks contain midpoints, which are machines that observe or filter traffic between endpoints. In this paper, we explain why midpoints should handle protocols differently from endpoints and thus midpoint specifications are needed. With a case study, using...

متن کامل

Distributed Firewalls

Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. More precisely, they rely on the assumption that everyone on one side of the entry point—the firewall—is to be trusted, and that anyone on the other side is, at least potentially, an enemy. The vastly expanded Internet connectivity in recent years has called that assumption into question. ...

متن کامل

CORBA Transactions through Firewalls

Electronic commerce on the Internet is evolving from simple customer-to-business interactions, like online shopping, to complex business-to-business extranet applications. These applications typically require backoffice processing in two or more organisations. CORBA provides abstractions that make it a good technology for building such applications. Transactions are a well known technique for e...

متن کامل

Personal Firewalls – Testing Robustness

Consumers require personal firewalls that are highly secure, easy to use, configurable and up­to­date with the latest signatures to detect malicious network activity. Robustness tests were performed on a selection of the ten most popular firewalls by market share. The test system used was a vanilla installation of Windows XP with SP2 and all the most recent updates and patches. Each firewall wa...

متن کامل

Thinking About Firewalls

Many companies connect to the Internet, guarded by "firewalls" designed to prevent unauthorized access to their private networks. Despite this general goal, many firewalls fall widely apart on a continuum between ease of use and security. This paper attempts to describe some of the background and tradeoffs in designing firewalls. A vocabulary for firewalls and their components is offered, to pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review D

سال: 2013

ISSN: 1550-7998,1550-2368

DOI: 10.1103/physrevd.88.084035