منابع مشابه
Midpoints Versus Endpoints: From Protocols to Firewalls
Today’s protocol specifications only define the behaviour of principals representing communication endpoints. But in addition to endpoints, networks contain midpoints, which are machines that observe or filter traffic between endpoints. In this paper, we explain why midpoints should handle protocols differently from endpoints and thus midpoint specifications are needed. With a case study, using...
متن کاملDistributed Firewalls
Conventional firewalls rely on the notions of restricted topology and controlled entry points to function. More precisely, they rely on the assumption that everyone on one side of the entry point—the firewall—is to be trusted, and that anyone on the other side is, at least potentially, an enemy. The vastly expanded Internet connectivity in recent years has called that assumption into question. ...
متن کاملCORBA Transactions through Firewalls
Electronic commerce on the Internet is evolving from simple customer-to-business interactions, like online shopping, to complex business-to-business extranet applications. These applications typically require backoffice processing in two or more organisations. CORBA provides abstractions that make it a good technology for building such applications. Transactions are a well known technique for e...
متن کاملPersonal Firewalls – Testing Robustness
Consumers require personal firewalls that are highly secure, easy to use, configurable and uptodate with the latest signatures to detect malicious network activity. Robustness tests were performed on a selection of the ten most popular firewalls by market share. The test system used was a vanilla installation of Windows XP with SP2 and all the most recent updates and patches. Each firewall wa...
متن کاملThinking About Firewalls
Many companies connect to the Internet, guarded by "firewalls" designed to prevent unauthorized access to their private networks. Despite this general goal, many firewalls fall widely apart on a continuum between ease of use and security. This paper attempts to describe some of the background and tradeoffs in designing firewalls. A vocabulary for firewalls and their components is offered, to pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review D
سال: 2013
ISSN: 1550-7998,1550-2368
DOI: 10.1103/physrevd.88.084035