Sciweavers

2904 search results - page 499 / 581
» Internet Infrastructure Security
Sort
View
SEC
2000
13 years 11 months ago
Improving Packet Filters Management through Automatic and Dynamic Schemes
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
Olivier Paul, Maryline Laurent
CN
2010
100views more  CN 2010»
13 years 9 months ago
A survey of network virtualization
Due to the existence of multiple stakeholders with conflicting goals and policies, alterations to the existing Internet are now limited to simple incremental updates; deployment o...
N. M. Mosharaf Kabir Chowdhury, Raouf Boutaba
COMCOM
2006
75views more  COMCOM 2006»
13 years 9 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin
CCR
2007
119views more  CCR 2007»
13 years 9 months ago
An edge-to-edge filtering architecture against DoS
Defending against large, distributed Denial-of-Service attacks is challenging, with large changes to the network core or to end-hosts often suggested. To make matters worse, spooï...
Felipe Huici, Mark Handley
JEC
2006
90views more  JEC 2006»
13 years 9 months ago
The impact of traffic aggregation on the memory performance of networking applications
The trend of the networking processing is to increase the intelligence of the routers (i.e. security capacities). This means that there is an increment in the workload generated p...
Javier Verdú, Jorge García-Vidal, Ma...