Smokey: A User-Based Distributed Firewall System

نویسنده

  • Rachel Rubin
چکیده

Traditional intranets have a central location on the network which easily allows the enforcement of a central security policy. They rely on the notion that there is one central entry point for all internal machines. Additionally, all machines that are considered logically inside the intranet reside behind the entry point. Increasingly this is not the case. We propose Smokey, a system that manages and distributes a central security policy to end clients on a network. Smokey installs a distributed firewall on a client based on a user’s location and needs. The security policy that it distributes is based on the credentials the user provides and the lowest level of access needed for the user to complete their tasks is enforced.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smokey: Automatic Recognition of Hostile Messages

Abusive messages (flames) can be both a source of frustration and a waste of time for Internet users. This paper describes some approaches to flame recognition, including a prototype system, Smokey. Smokey builds a 47-element feature vector based on the syntax and semantics of each sentence, combining the vectors for the sentences within each message. A training set of 720 messages was used by ...

متن کامل

Component-Based Design of Large Distributed Real-Time Systems

Large distributed real-time systems can be built effectively by integrating a set of nearly autonomous components that communicate via stable control-free interfaces, called temporal firewalls. A temporal firewall provides an understandable abstraction of the subsystem behind the firewall, confines the impact of most changes to the encapsulated subsystem, and limits the potential of error propa...

متن کامل

Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database

The society has grown to rely on internet services, and the number of internet client increases every day. As more users are connected to the network, millions a user to do their damage becomes very great and lucrative. In conventional firewall rely on topology restrictions and controlled network entry points to enforce packet filtering. In this paper, I propose method of multiple firewall conc...

متن کامل

Emulating an Embedded Firewall

The Adventium Labs Embedded Distributed Firewall provides a simple interface for securely managing approved network flows between computers on a network. A “conversation” manager provides a simple interface for managing flows, defining the connections authorized between nodes on a network. These policies are enforced in hardware embedded in the network interface card of each computer. The polic...

متن کامل

On the Usability of Firewall Configuration

The firewalls in an enterprise network must be configured correctly or the internal corporate network can be infiltrated, leading to serious security, financial and performance implications. However, firewall configuration is a complex and error-prone task. Configuration languages are like assembly languages: they are low-level and vendor-specific. Moreover, usually multiple firewalls must be c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002