Is the firewall consistent? Gedanken experiments on black hole complementarity and firewall proposal
نویسندگان
چکیده
منابع مشابه
Firewall Management With FireWall Synthesizer
Firewalls are notoriously hard to configure and maintain. Policies are written in lowlevel, system-specific languages where rules are inspected and enforced along non-trivial control flow paths. Moreover, firewalls are tightly related to Network Address Translation (NAT) since filters need to be specified taking into account the possible translations of packet addresses, further complicating th...
متن کاملGedanken experiments involving black holes.
Analysis of several gedanken experiments indicates that black hole complementarity cannot be ruled out on the basis of known physical principles. Experiments designed by outside observers to disprove the existence of a quantum-mechanical stretched horizon require knowledge of Planck-scale effects for their analysis. Observers who fall through the event horizon after sampling the Hawking radiati...
متن کاملRemarks on the GWV Firewall
Greve, Wilding and Vanfleet (2003) have proposed a formal security policy for separation kernels, and used it prove a security claim for a firewall implemented in a system satisfying this security policy. The paper revisits their example and formulates a more general version of the result, that simplifies its structure and clarifies its information theoretic content.
متن کاملReviews and Perspectives on Black Hole Complementarity *
If black hole complementarity is the correct idea to resolve the information loss problem, it should apply to general black holes. We suggest two models: Frolov, Markov, and Mukhanov’s regular black hole and a charged black hole. These models can work as counterexamples to black hole complementarity. It has been mentioned that a large number of massless fields is an important condition to justi...
متن کاملFirewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks, firewalls are utilized since they restrict network access while letting legitimate users have unencumbered access. Firewalls are also used to log security auditing information about connections and operations. We desc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cosmology and Astroparticle Physics
سال: 2013
ISSN: 1475-7516
DOI: 10.1088/1475-7516/2013/01/005