Sciweavers

1970 search results - page 11 / 394
» Security Without Firewalls
Sort
View
CLUSTER
2005
IEEE
14 years 1 months ago
A Generic Proxy Mechanism for Secure Middlebox Traversal
Firewalls/NATs have brought significant connectivity problems along with their benefits, causing many applications to break or become inefficient. Due to its bi-directional commun...
Se-Chang Son, Matthew Farrellee, Miron Livny
CCS
2009
ACM
14 years 3 days ago
A chipset level network backdoor: bypassing host-based firewall & IDS
Sherri Sparks, Shawn Embleton, Cliff Changchun Zou
TRUSTBUS
2010
Springer
13 years 5 months ago
Safe and Efficient Strategies for Updating Firewall Policies
Abstract. Due to the large size and complex structure of modern networks, firewall policies can contain several thousand rules. The size and complexity of these policies require au...
Zeeshan Ahmed, Abdessamad Imine, Michaël Rusi...
INFOCOM
2012
IEEE
11 years 10 months ago
Firewall fingerprinting
—Firewalls are critical security devices handling all traffic in and out of a network. Firewalls, like other software and hardware network devices, have vulnerabilities, which c...
Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex ...
HICSS
2003
IEEE
85views Biometrics» more  HICSS 2003»
14 years 23 days ago
Revisiting the Firewall Abolition Act
Mobility and the New Global Economy are accompanied by requirements for dynamism and flexibility, with respect to e-commerce, inter-organizational activity, and security. The clas...
Philip Robinson, Jochen Haller