|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 741 occurrences of 469 keywords
|
|
|
Results
Found 803 publication records. Showing 803 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
140 | Robert N. Smith, Yu Chen, Sourav Bhattacharya |
Cascade of Distributed and Cooperating Firewalls in a Secure Data Network. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
class-filters, cascade of firewalls, network security, Firewall, data security, security management, multilevel security |
94 | Robert N. Smith, Sourav Bhattacharya |
A Protocol and Simulation for Distributed Communicating Firewalls. |
COMPSAC |
1999 |
DBLP DOI BibTeX RDF |
Firewall Cascade, Firewall Leak, Simulation, Java, Fault-Tolerance, Network Security, Emulation, Firewall, Security Management |
84 | Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz |
Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls. |
IWQoS |
2008 |
DBLP DOI BibTeX RDF |
|
83 | Jeremy Epstein, L. Thomas, Eric Monteith |
Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
operating system wrappers, commercial firewalls, fine grained control, application proxy firewalls, experiments, computer networks, network operating systems, authorisation, telecommunication security, applications software, malicious software |
75 | Robert N. Smith, Sourav Bhattacharya |
Operating firewalls outside the LAN perimeter. |
IPCCC |
1999 |
DBLP DOI BibTeX RDF |
|
74 | Khaled Salah 0001, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam |
Resiliency of open-source firewalls against remote discovery of last-matching rules. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
dos attacks, nework security, firewalls |
74 | Hermann Kopetz, Roman Nossal |
Temporal firewalls in large distributed real-time systems. |
FTDCS |
1997 |
DBLP DOI BibTeX RDF |
large distributed real-time systems, temporal firewalls, autonomous subsystems, stable control-free interfaces, encapsulated subsystem, static properties, controlled object, real-time systems, complexity, abstraction, error propagation, system partitioning |
66 | Pavan Verma, Atul Prakash 0001 |
FACE: A Firewall Analysis and Configuration Engine. |
SAINT |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth |
Limitations of the Approach of Solving a Network's Security Problem with a Firewall. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
65 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. |
SAFECOMP |
2006 |
DBLP DOI BibTeX RDF |
NIDSs, Policy Anomalies, Network Security, Firewalls |
65 | Pablo Neira Ayuso, Rafael M. Gasca, Laurent Lefèvre |
Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
65 | Jan Jürjens, Guido Wimmel |
Specification-Based Testing of Firewalls. |
Ershov Memorial Conference |
2001 |
DBLP DOI BibTeX RDF |
|
57 | Chi-Shih Chao |
A Visualized Internet Firewall Rule Validation System. |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
Firewall security consistency, Rule anomalies, Policy-based network security management, System visualization |
56 | Mohamed G. Gouda, Alex X. Liu |
A Model of Stateful Firewalls and Its Properties. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
56 | B. K. Woo, Dong-Soo Kim, S. S. Hong, K. H. Kim, Tai-Myung Chung |
Interval Weighted Load Balancing Method for Multiple Application Gateway Firewalls. |
International Conference on Computational Science (3) |
2002 |
DBLP DOI BibTeX RDF |
|
55 | Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
A secure mobile agents approach for anomalies detection on firewalls. |
iiWAS |
2008 |
DBLP DOI BibTeX RDF |
trust agent, mobile agent, anomalies detection, firewalls |
55 | Utz Roedig, Jens B. Schmitt |
Multimedia and firewalls: a performance perspective. |
Multim. Syst. |
2005 |
DBLP DOI BibTeX RDF |
Keyword Firewalls, QoS, Performance, Multimedia, Network Security |
55 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
46 | Tomás E. Uribe, Steven Cheung |
Automatic analysis of firewall and network intrusion detection system configurations. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
formal specification and analysis, network configuration and security, firewalls, network intrusion detection |
46 | Pablo Neira Ayuso, Rafael Martinez Gasca, Laurent Lefèvre |
FT-FW: Efficient Connection Failover in Cluster-based Stateful Firewalls. |
PDP |
2008 |
DBLP DOI BibTeX RDF |
fault tolerant, firewall, stateful |
46 | Almut Herzog, Nahid Shahmehri |
Usability and Security of Personal Firewalls. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Shinya Masuda, Hidekazu Suzuki, Naonobu Okazaki, Akira Watanabe |
Proposal for a Practical Cipher Communication Protocol That Can Coexist with NAT and Firewalls. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Alex X. Liu, Mohamed G. Gouda |
Complete Redundancy Detection in Firewalls. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
Redundant Rules, Network Security, Firewall |
46 | Dong-Young Lee |
A Study on the Centralized Database of the Multi-agents Based Integrated Security Management System for Managing Heterogeneous Firewalls. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Lu Yan |
Via Firewalls. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Rasool Jalili, Mohsen Rezvani |
Specification and Verification of Security Policies in Firewalls. |
EurAsia-ICT |
2002 |
DBLP DOI BibTeX RDF |
Formal Specification, Security Policy, Firewall |
46 | Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne |
Domain and Type Enforcement Firewalls. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP |
38 | Emanuel P. Freire, Artur Ziviani, Ronaldo M. Salles |
Detecting Skype flows in Web traffic. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Abhinav Srivastava, Jonathon T. Giffin |
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
virtual machine introspection, attack prevention, Firewall |
38 | Alex X. Liu, Eric Torng, Chad R. Meiners |
Firewall Compressor: An Algorithm for Minimizing Firewall Policies. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Lihua Yuan, Jianning Mai, Zhendong Su 0001, Hao Chen 0003, Chen-Nee Chuah, Prasant Mohapatra |
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Ehab Al-Shaer, Hazem H. Hamed, Raouf Boutaba, Masum Hasan |
Conflict classification and analysis of distributed firewall policies. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Philip Robinson, Jochen Haller |
Revisiting the Firewall Abolition Act. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
37 | J. Lane Thames, Randal T. Abler, David Keeling |
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting. |
ACM Southeast Regional Conference |
2009 |
DBLP DOI BibTeX RDF |
path matrix, firewalls, packet classification, blacklisting, bit vectors |
37 | Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
Misconfigurations discovery between distributed security components using the mobile agent approach. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
anomalies detection system (IDS), intra/inter-components anomalies detection, static agent, mobile agents, firewalls, misconfigurations |
37 | J. Lane Thames, Randal T. Abler, David Keeling |
A distributed firewall and active response architecture providing preemptive protection. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
active intrusion response, distributed firewalls, intrusion detection systems |
37 | John S. Heidemann, Yuri Pryadkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, Joseph A. Bannister |
Census and survey of the visible internet. |
Internet Measurement Conference |
2008 |
DBLP DOI BibTeX RDF |
census, internet address allocation, survey, firewalls, ipv4 |
37 | Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H. H. Ngu |
Firewall Queries. |
OPODIS |
2004 |
DBLP DOI BibTeX RDF |
Firewall Queries, Network Security, Firewalls |
37 | Voravud Santiraveewan, Yongyuth Permpoontanalarp |
A Graph-based Methodology for Analyzing IP Spoofing Attack. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
IP spoofing and Formal Method for Network Security, Network Security, Firewalls |
37 | Steve Wood, Gordon W. Romney |
Protection methods against IP packet attacks. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
TCP vulnerabilities, UDP vulnerabilities, packet inspection, intrusion detection systems, firewalls, access control list, intrusion prevention systems |
37 | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow |
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability |
37 | Scott Hazelhurst, Adi Attar, Raymond Sinnappan |
Algorithms for Improving the Dependability of Firewall and Filter Rule Lists. |
DSN |
2000 |
DBLP DOI BibTeX RDF |
Boolean decision diagrams, validation, filtering, firewalls, traffic management |
37 | E. Strother |
Denial of Service Protection - The Nozzle. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource |
37 | Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov, Kellogg S. Booth |
Investigating an appropriate design for personal firewalls. |
CHI Extended Abstracts |
2010 |
DBLP DOI BibTeX RDF |
personal firewall, usable security |
37 | Pablo Neira Ayuso, Laurent Lefèvre, Rafael Martinez Gasca |
hFT-FW: Hybrid Fault-Tolerance for Cluster-Based Stateful Firewalls. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Michael R. Horvath, Errin W. Fulp, Patrick S. Wheeler |
Policy Distribution Methods for Function Parallel Firewalls. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Diana von Bidder, David A. Basin, Germano Caronni |
Midpoints Versus Endpoints: From Protocols to Firewalls. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Subrata Acharya, Jia Wang 0001, Zihui Ge, Taieb Znati, Albert G. Greenberg |
Simulation Study of Firewalls to Aid Improved Performance. |
Annual Simulation Symposium |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Denis Caromel, Alexandre di Costanzo, Dennis Gannon, Aleksander Slominski |
Asynchronous Peer-to-PeerWeb Services and Firewalls. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Michael Stukas, Douglas C. Sicker |
An Evaluation of VoIP Traversal of Firewalls and NATs within an Enterprise Environment. |
Inf. Syst. Frontiers |
2004 |
DBLP DOI BibTeX RDF |
SIP, VoIP, firewall, enterprise, NAT |
37 | Burton S. Kaliski Jr. |
On Hash Function Firewalls in Signature Schemes. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Khalid Al-Tawil, Ibrahim A. Al-Kaltham |
Evaluation and testing of internet firewalls. |
Int. J. Netw. Manag. |
1999 |
DBLP DOI BibTeX RDF |
|
37 | John T. McHenry, Patrick W. Dowd, Frank A. Pellegrino, Todd M. Carrozzi, W. B. Cocks |
An FPGA-based coprocessor for ATM firewalls. |
FCCM |
1997 |
DBLP DOI BibTeX RDF |
|
36 | Csaba Simon, Attila Török |
ATM Security with Firewalls. |
ISCC |
2000 |
DBLP DOI BibTeX RDF |
ATM security, ATM signaling, firewalls |
36 | Samuel Patton, David Doss, William Yurcik |
Open Source Versus Commercial Firewalls: Functional Comparison. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
corporate applications, commercial firewalls, security risks, Cisco, IOS firewall feature set, Internet, Internet, open source, open source software, open systems, network operating systems, authorisation, telecommunication security, virtual private network, business communication, Linux operating system |
36 | Subrata Acharya |
Accelerating Firewalls: Tools, Techniques and Metrics for Optimizing Distributed Enterprise Firewalls. |
Handbook of Optimization |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Alex X. Liu, Mohamed G. Gouda |
Firewall Policy Queries. |
IEEE Trans. Parallel Distributed Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Ana-Maria Ghiran, Gheorghe Cosmin Silaghi, Nicolae Tomai |
Ontology-Based Tools for Automating Integration and Validation of Firewall Rules. |
BIS |
2009 |
DBLP DOI BibTeX RDF |
firewall management, Ontologies, rule-based reasoning |
28 | Alex X. Liu |
Formal Verification of Firewall Policies. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Zobeideh Aliannezhadi, Mohammad Abdollahi Azgomi |
Modeling and Analysis of a Web Service Firewall Using Coloured Petri Nets. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
28 | James Walden |
Integrating web application security into the IT curriculum. |
SIGITE Conference |
2008 |
DBLP DOI BibTeX RDF |
web security education, web application security |
28 | Przemyslaw Krekora |
An approach to change availability of the service by adding forecasting module to firewall. |
DepCoS-RELCOMEX |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Bin Zhang 0007, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher |
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
firewall, policy language, conflicts free |
28 | Weiping Wang 0006, Wenhui Chen, Zhepeng Li, Huaping Chen 0001 |
Comparison Model and Algorithm for Distributed Firewall Policy. |
ICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia |
Analysis of Policy Anomalies on Distributed Network Security Setups. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Se-Chang Son, Bill Allcock, Miron Livny |
CODO: firewall traversal by cooperative on-demand opening. |
HPDC |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Avishai Wool |
A Quantitative Study of Firewall Configuration Errors. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège |
A Formal Approach to Specify and Deploy a Network Security Policy. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Victor Paulsamy, Samir Chatterjee |
Network Convergence and the NAT/Firewall Problems. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Tetsuya Oh-ishi, Koji Sakai, Tetsuya Iwata, Akira Kurokawa |
The Deployment of Cache Servers in P2P Networks for Improved Performance in Content-Delivery. |
Peer-to-Peer Computing |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas |
A Unified Methodology for Verification and Synthesis of Firewall Configurations. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Alain J. Mayer, Avishai Wool, Elisha Ziskind |
Fang: A Firewall Analysis Engine. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
Vulnerability Testing, Network Security, Firewall |
28 | Mohammad Sajjad Hossain, Vijay Raghunathan |
AEGIS: a rule based framework for traffic gatekeeping in wireless sensor networks. |
IPSN |
2010 |
DBLP DOI BibTeX RDF |
network overlays, traffic gatekeeping, wireless sensor networks, firewalls |
28 | Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens |
Complete analysis of configuration rules to guarantee reliable network security policies. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Policy anomalies, Network security, Intrusion Detection systems, Firewalls |
28 | Pablo Neira Ayuso, Laurent Lefèvre, Denis Barbaron, Rafael M. Gasca |
Towards a Dependable Architecture for Highly Available Internet Services. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Stateful firewalls, Reliability, High Availability, active replication |
28 | Asaad Moosa, Eanas Muhsen Alsaffar |
Proposing a hybrid-intelligent framework to secure e-government web applications. |
ICEGOV |
2008 |
DBLP DOI BibTeX RDF |
negative logic based filtering, positive logic based filtering, session based filtering, web application firewalls, whitelist, neural networks, fuzzy logic, e-government, web application, blacklist |
28 | Roberto D. Rubino |
An open system for transparent firewall authentication and user traffic identification within corporate intranets. |
SIGITE Conference |
2008 |
DBLP DOI BibTeX RDF |
security, firewalls, packet marking |
28 | Christian Grimm, Harald Schwier |
Empirical Analysis of TCP Variants and Their Impact on GridFTP Port Requirements. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
TCP BIC, Congestion Control, Firewalls, High Performance Networking, GridFTP |
28 | Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham |
Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Security Policy, Firewalls, Anomalies, Packet Filters |
28 | Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato J. O. Figueiredo |
WOW: Self-Organizing Wide Area Overlay Networks of Virtual Workstations. |
HPDC |
2006 |
DBLP DOI BibTeX RDF |
self-organizing wide area overlay network, virtual workstation, WOW distributed system, peer-to-peer technique, user-level decentralized technique, IP packet, PVM-based fastDNAml application, virtual IP layer, virtual machine, local-area network, firewalls, WAN, cluster of workstations, high-throughput computing, client-server application |
28 | Mark Allman |
On the performance of middleboxes. |
Internet Measurement Conference |
2003 |
DBLP DOI BibTeX RDF |
firewalls, TCP performance, middleboxes |
28 | Ralf Ackermann, Utz Roedig, Michael Zink, Carsten Griwodz, Ralf Steinmetz |
Associating network flows with user and application information. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
network traffic marking, security, watermarking, firewalls |
28 | P. C. Clark, M. C. Meissner, K. O. Vance |
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
secure compartmented data access, untrusted network, COTS-based architecture, secure network computing architecture, application-level firewalls, DoD applications, software architecture, access control, electronic commerce, computer networks, authorisation, telecommunication security, electronic business, military computing, military applications, sensitive information, commercial-off-the-shelf products, sensitive data |
28 | Samuel Patton, Bryan Smith, David Doss, William Yurcik |
A Virtual Private Network Deployment Framework. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
telecommunication network planning, layered VPN planning, virtual private network deployment, VPN technology, legacy networks, interoperability, network security, firewalls, open systems, survivability, authorisation, telecommunication security, business communication, telecommunication network reliability, legacy applications |
28 | Pieter Liefooghe, Marnix Goossens |
An Architecture for Seamless Access to Multicast Content. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
seamless access, multicast content, transparent access, multicast infrastructure, dynamic tunnel server location, rare-based path characterization, UMTP, dynamic congestion discovery, tunnel hand-over mechanism, session directory application, session announcements, SAP/SDP proxy location, SAP/SDP query mechanism, IP multicast packets, computer networks, transport protocols, packet switching, firewalls, network architecture, multicast communication, authorisation, network servers |
28 | Marcel Waldvogel |
Multi-Dimensional Prefix Matching Using Line Search. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
multidimensional prefix matching, filter database, 1D binary search, prefix lengths, transport header match, 5D IP, quality of service, quality of service, Internet, Internet, transport protocols, packet switching, Internet protocol, firewalls, search problems, QoS routing, telecommunication network routing, packet classification, VPN, virtual private networks, line search |
28 | C. Cant, Simon R. Wiseman |
Simple Assured Bastion Hosts. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation |
28 | Hermann Kopetz |
Why time-triggered architectures will succeed in large hard real-time systems. |
FTDCS |
1995 |
DBLP DOI BibTeX RDF |
large hard real-time systems, encapsulated subsystems, temporal firewalls, sparse time base, replica determinism, time-triggered communication protocol, real-time systems, computational complexity, computer architecture, design principles, time-triggered architectures |
28 | Moses Garuba, Chunmei Liu, Alicia Nicki Washington |
A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Venanzio Capretta, Bernard Stepien, Amy P. Felty, Stan Matwin |
Formal correctness of conflict detection for firewalls. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
firewall, coq |
28 | Hazem H. Hamed, Adel El-Atawy, Ehab Al-Shaer |
On Dynamic Optimization of Packet Matching in High-Speed Firewalls. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten |
Bridging the gap between web application firewalls and web applications. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
run-time enforcement, shared data repository, web spplication girewall, static verification |
28 | Nelson Baloian, José A. Pino, Marc Jansen |
Implementing the Coupled Objects Paradigm for Synchronizing Distributed Applications Through Firewalls. |
CSCWD (Selected Papers) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Nelson A. Baloian, Marc Jansen, José A. Pino |
MatchMaker - A Flexible Synchronizing Mechanism for Distributed Applications through Firewalls. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Stephen J. Tarsa, Errin W. Fulp |
Balancing Trie-Based Policy Representations for Network Firewalls. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Livio Riciulli |
Advanced networks - High speed firewalls: securing the 10 gigabit ethernet WAN. |
SC |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Errin W. Fulp, Stephen J. Tarsa |
Trie-Based Policy Representations for Network Firewalls. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
On Securing RTP-Based Streaming Content with Firewalls. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
streaming content, Network security, firewall |
28 | Ingo Melzer, Mario Jeckle |
Using Corporate Firewalls for Web Services Trust. |
ICWS-Europe |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Marco Cremonini, Sabrina De Capitani di Vimercati, Ernesto Damiani, Pierangela Samarati |
An XML-based approach to combine firewalls and web services security specifications. |
XML Security |
2003 |
DBLP DOI BibTeX RDF |
service security, Web services, network security, firewall, SOAP |
Displaying result #1 - #100 of 803 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|