Midpoints Versus Endpoints: From Protocols to Firewalls

نویسندگان

  • Diana von Bidder
  • David A. Basin
  • Germano Caronni
چکیده

Today’s protocol specifications only define the behaviour of principals representing communication endpoints. But in addition to endpoints, networks contain midpoints, which are machines that observe or filter traffic between endpoints. In this paper, we explain why midpoints should handle protocols differently from endpoints and thus midpoint specifications are needed. With a case study, using the TCP protocol and three different firewalls as midpoints, we illustrate the consequences of the current lack of protocol specifications for midpoints, namely that the same protocol is implemented differently by the different firewalls. We then propose a solution to the problem: We give an algorithm that generates a midpoint automaton from specifications of endpoint automata. We prove that the resulting midpoint automata are correct in that they forward only those messages that could have resulted from protocol-conform endpoints. Finally, we illustrate the algorithm on the TCP protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Endpoints and Midpoints in Event Perception

Events unfold over time, i.e., they have a beginning and endpoint. Previous studies have illustrated the importance of endpoints for the perception and memory of various events (Lakusta & Landau, 2005, 2012; Papafragou, 2010; Regier & Zheng, 2009; Strickland & Keil, 2011; Zacks & Swallow, 2007). However, this work has not compared endpoints to other potentially salient points in the internal te...

متن کامل

Firewalls in an OSI-environment

A firewall is a well established security measure for connecting to the Internet (TCP/IP protocol suite). Government procurement profiles for data communication products (GOSIPs Government OSI Profile) usually demand use of official international standards, as defined by the International Standards Organization (ISO). ISO has defined a framework for Open Systems Interconnection (OSI), and devel...

متن کامل

Comparison of Topological Indices Based on Iterated ‘Sum’ versus ‘Product’ Operations

The Padmakar-Ivan (PI) index is a first-generation topological index (TI) based on sums over all edges between numbers of edges closer to one endpoint and numbers of edges closer to the other endpoint. Edges at equal distances from the two endpoints are ignored. An analogous definition is valid for the Wiener index W, with the difference that sums are replaced by products. A few other TIs are d...

متن کامل

A novel approach to protect Grids with firewalls A System for Distributed Computing Based on H2O and JXTA

A System for Distributed Computing Based on H2O and JXTA Motivation The communication requirements of common Grid middlewares, with their extensive demand for unhindered communication, run contrary to the concept of legacy firewalls. The devices are normally statically configured to accept or deny certain packets or communication streams. Advanced firewalls include application-level gateways th...

متن کامل

I-27: Management of Poor Responders:Current and Past Recommended Strategy

The management of poor responders in IVF cycles is extremely controversial due to their inadequate response to controlled ovarian hyperstimulation.. A low ovarian response may be idiopathic or may be associated with many different factors including age, diminished ovarian reserve, endometriosis and prior ovarian surgery, and a reported incidence 9-24% of IVF patients. Several strategies have be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007