نتایج جستجو برای: firewall
تعداد نتایج: 4739 فیلتر نتایج به سال:
Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying user permissions and examining packet contents, conventional firewalls are not suitable for protecting service-oriented systems from unauthorised service invocations. In this paper, we present a formal XML firewall secur...
The increased cyber-attacks in recent years have included violation of firewalls. Based on these facts, our study and main objective is to present the formation of a platform for open source firewall, which induces a highly efficient method to strengthen detection, control and also mitigation of such assaults. In order to fulfill these aims, we designed and implemented an experimental LAN / WAN...
The NAI Labs Advanced Security Proxies (ASP) project is investigating software architectures for high-performance firewalls to enable the secure use of next generation networks. The project objective is to demonstrate an architecture and implementation in which protocol-specific proxies control when data transmission is allowed across the firewall, but which allows the proxy a range of options ...
Within a global networked environment, security aspects have become more and more important and access control at network borders is considered essential. For this purpose firewall systems are used which provide a well-established security mechanism to restrict the exchanged traffic to a certain subset of users and applications. In order to cope with the increasing demand for new applications, ...
With the turn of this century, many researchers started showing interest in Embedded Firewall (EF) implementations. These are not the usual firewalls that are used as checkpoints at network gateways. They are, rather, applied near those hosts that need protection. Hence by using them, individual or grouped network components can be protected from the inside as well as from external attacks. Thi...
The paper presents the way to provide the security to one of the recent development in computing, cloud computing. The main interest is to investigate the impact of using Virtual Private Network VPN together with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud computing with OPNET modular simulator has been conducted for the cases of cloud computing...
XML is rapidly becoming the default way for organizations to sharing information across networks and organizational boundaries. XML was designed as an information mark-up language and was not designed with security in mind. Consequently we are left with the problem of security XML documents from attacks such as malicious modification or fabrication. With modern VPN technology such as SSL we can...
Firewalls are the devices that we are used to protect data. It might be configured to allow certain devices or applications to access our network. The Firewalls are termed as stateful devices. Traditional firewalls typically need to inspect each packet to ensure that it adheres to the policy that has been configured or not, and then perform the necessary action associated to that particular rul...
Due to the impact of wireless sensor networks (WSN) on dramatic reduction in computational and energy resources, research on the implications of this type of networks would be considered as a deliberate and update point. One of the main issues in these networks is the security. During transfer of data from source nodes to sink nodes or vice versa, many WSNs require applications to protect data ...
Network firewalls are a standard security measure in computer networks that connect to the Internet. Often, ready-to-use firewall appliances are trusted to protect the network from malicious Internet traffic. However, because of their black-box nature, no one can be sure of their exact functionality. We address the possibility of actively compromised firewalls. That is, we consider the possibil...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید