نتایج جستجو برای: clustring and firewall

تعداد نتایج: 16827414  

Journal: :IACR Cryptology ePrint Archive 2015
Yevgeniy Dodis Ilya Mironov Noah Stephens-Davidowitz

A secure reverse firewall, as recently defined by Mironov and Stephens-Davidowitz, is a third party that “sits between a user and the outside world” and modifies the user’s sent and received messages so that even if the user’s machine has been corrupted, her security is still guaranteed. In other words, reverse firewalls allow us to provide meaningful (and, indeed, very strong) security guarant...

2006
Patryk Szewczyk Craig Valli

Consumers require personal firewalls that are highly secure, easy to use, configurable and up­to­date with the latest signatures to detect malicious network activity. Robustness tests were performed on a selection of the ten most popular firewalls by market share. The test system used was a vanilla installation of Windows XP with SP2 and all the most recent updates and patches. Each firewall wa...

Journal: :Theor. Comput. Sci. 2002
Flemming Nielson Hanne Riis Nielson René Rydhof Hansen

The ambient calculus is a calculus of computation that allows active processes to communicate and to move between sites. A site is said to be a protective firewall whenever it denies entry to all attackers not possessing the required passwords. We devise a computationally sound test for validating the protectiveness of a proposed firewall and show how to perform the test in polynomial time. The...

2010
Shaun P. Morrissey Georges Grinstein Brenden Keyes

Firewall configuration files are created and edited as text files, despite significant size, complexity, and the possibility of interaction between entries. We embedded interactive visualizations in a simple firewall ruleset editor. To make rulesets visualizable, we calculate the set of packets accepted by the firewall as a restricted case of constructive solid geometry. We show a lossless visu...

2014
Walter Fuertes Patricio Zambrano Marco Sánchez Mónica Santillán César Villacís Theofilos Toulkeridis Edgar Torres

The increased cyber-attacks in recent years have included violation of firewalls. Based on these facts, our study and main objective is to present the formation of a platform for open source firewall, which induces a highly efficient method to strengthen detection, control and also mitigation of such assaults. In order to fulfill these aims, we designed and implemented an experimental LAN / WAN...

2014
Siddeeq Y. Ameen Shayma Wail Nourildean

The paper presents the way to provide the security to one of the recent development in computing, cloud computing. The main interest is to investigate the impact of using Virtual Private Network VPN together with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud computing with OPNET modular simulator has been conducted for the cases of cloud computing...

2010
Vladimir S. Zaborovsky Vladimir Mulukha Sergey Kouprienko Oleg Zayats

We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi-core implementation. Proposed randomized push-out buffer management mechanism with α parameter allows tuning very efficiently the loss probability of priority packets and the time they spend in queue as the factors u...

Journal: :IJSN 2008
Haiping Xu Mihir M. Ayachit Abhinay Reddyreddy

Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying user permissions and examining packet contents, conventional firewalls are not suitable for protecting service-oriented systems from unauthorised service invocations. In this paper, we present a formal XML firewall secur...

2001
Utz Roedig Manuel Görtz Martin Karsten Ralf Steinmetz

Within a global networked environment, security aspects have become more and more important and access control at network borders is considered essential. For this purpose firewall systems are used which provide a well-established security mechanism to restrict the exchanged traffic to a certain subset of users and applications. In order to cope with the increasing demand for new applications, ...

2013
Afshin Jahanbin Ahmad Ghafarian Seyed Amin Hosseeini Samane Nikookar

Due to the impact of wireless sensor networks (WSN) on dramatic reduction in computational and energy resources, research on the implications of this type of networks would be considered as a deliberate and update point. One of the main issues in these networks is the security. During transfer of data from source nodes to sink nodes or vice versa, many WSNs require applications to protect data ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید