The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for firewalls with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1996 (15) 1997-1998 (18) 1999 (17) 2000 (18) 2001 (26) 2002 (39) 2003 (51) 2004 (68) 2005 (69) 2006 (76) 2007 (86) 2008 (70) 2009 (39) 2010 (24) 2011-2012 (26) 2013-2014 (29) 2015 (17) 2016 (18) 2017-2018 (20) 2019 (16) 2020 (16) 2021 (16) 2022-2023 (28) 2024 (1)
Publication types (Num. hits)
article(172) book(9) incollection(14) inproceedings(605) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 741 occurrences of 469 keywords

Results
Found 803 publication records. Showing 803 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
140Robert N. Smith, Yu Chen, Sourav Bhattacharya Cascade of Distributed and Cooperating Firewalls in a Secure Data Network. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF class-filters, cascade of firewalls, network security, Firewall, data security, security management, multilevel security
94Robert N. Smith, Sourav Bhattacharya A Protocol and Simulation for Distributed Communicating Firewalls. Search on Bibsonomy COMPSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Firewall Cascade, Firewall Leak, Simulation, Java, Fault-Tolerance, Network Security, Emulation, Firewall, Security Management
84Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls. Search on Bibsonomy IWQoS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
83Jeremy Epstein, L. Thomas, Eric Monteith Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF operating system wrappers, commercial firewalls, fine grained control, application proxy firewalls, experiments, computer networks, network operating systems, authorisation, telecommunication security, applications software, malicious software
75Robert N. Smith, Sourav Bhattacharya Operating firewalls outside the LAN perimeter. Search on Bibsonomy IPCCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
74Khaled Salah 0001, Karim Sattar, Zubair A. Baig, Mohammed H. Sqalli, Prasad Calyam Resiliency of open-source firewalls against remote discovery of last-matching rules. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dos attacks, nework security, firewalls
74Hermann Kopetz, Roman Nossal Temporal firewalls in large distributed real-time systems. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF large distributed real-time systems, temporal firewalls, autonomous subsystems, stable control-free interfaces, encapsulated subsystem, static properties, controlled object, real-time systems, complexity, abstraction, error propagation, system partitioning
66Pavan Verma, Atul Prakash 0001 FACE: A Firewall Analysis and Configuration Engine. Search on Bibsonomy SAINT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
66Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth Limitations of the Approach of Solving a Network's Security Problem with a Firewall. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
65Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. Search on Bibsonomy SAFECOMP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF NIDSs, Policy Anomalies, Network Security, Firewalls
65Pablo Neira Ayuso, Rafael M. Gasca, Laurent Lefèvre Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
65Jan Jürjens, Guido Wimmel Specification-Based Testing of Firewalls. Search on Bibsonomy Ershov Memorial Conference The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
57Chi-Shih Chao A Visualized Internet Firewall Rule Validation System. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Firewall security consistency, Rule anomalies, Policy-based network security management, System visualization
56Mohamed G. Gouda, Alex X. Liu A Model of Stateful Firewalls and Its Properties. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
56B. K. Woo, Dong-Soo Kim, S. S. Hong, K. H. Kim, Tai-Myung Chung Interval Weighted Load Balancing Method for Multiple Application Gateway Firewalls. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
55Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala A secure mobile agents approach for anomalies detection on firewalls. Search on Bibsonomy iiWAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trust agent, mobile agent, anomalies detection, firewalls
55Utz Roedig, Jens B. Schmitt Multimedia and firewalls: a performance perspective. Search on Bibsonomy Multim. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Keyword Firewalls, QoS, Performance, Multimedia, Network Security
55Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
46Tomás E. Uribe, Steven Cheung Automatic analysis of firewall and network intrusion detection system configurations. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF formal specification and analysis, network configuration and security, firewalls, network intrusion detection
46Pablo Neira Ayuso, Rafael Martinez Gasca, Laurent Lefèvre FT-FW: Efficient Connection Failover in Cluster-based Stateful Firewalls. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fault tolerant, firewall, stateful
46Almut Herzog, Nahid Shahmehri Usability and Security of Personal Firewalls. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Shinya Masuda, Hidekazu Suzuki, Naonobu Okazaki, Akira Watanabe Proposal for a Practical Cipher Communication Protocol That Can Coexist with NAT and Firewalls. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Alex X. Liu, Mohamed G. Gouda Complete Redundancy Detection in Firewalls. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Redundant Rules, Network Security, Firewall
46Dong-Young Lee A Study on the Centralized Database of the Multi-agents Based Integrated Security Management System for Managing Heterogeneous Firewalls. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Lu Yan Via Firewalls. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Rasool Jalili, Mohsen Rezvani Specification and Verification of Security Policies in Firewalls. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Formal Specification, Security Policy, Firewall
46Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne Domain and Type Enforcement Firewalls. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP
38Emanuel P. Freire, Artur Ziviani, Ronaldo M. Salles Detecting Skype flows in Web traffic. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Abhinav Srivastava, Jonathon T. Giffin Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine introspection, attack prevention, Firewall
38Alex X. Liu, Eric Torng, Chad R. Meiners Firewall Compressor: An Algorithm for Minimizing Firewall Policies. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Lihua Yuan, Jianning Mai, Zhendong Su 0001, Hao Chen 0003, Chen-Nee Chuah, Prasant Mohapatra FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Ehab Al-Shaer, Hazem H. Hamed, Raouf Boutaba, Masum Hasan Conflict classification and analysis of distributed firewall policies. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Philip Robinson, Jochen Haller Revisiting the Firewall Abolition Act. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37J. Lane Thames, Randal T. Abler, David Keeling Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF path matrix, firewalls, packet classification, blacklisting, bit vectors
37Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala Misconfigurations discovery between distributed security components using the mobile agent approach. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomalies detection system (IDS), intra/inter-components anomalies detection, static agent, mobile agents, firewalls, misconfigurations
37J. Lane Thames, Randal T. Abler, David Keeling A distributed firewall and active response architecture providing preemptive protection. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF active intrusion response, distributed firewalls, intrusion detection systems
37John S. Heidemann, Yuri Pryadkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, Joseph A. Bannister Census and survey of the visible internet. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF census, internet address allocation, survey, firewalls, ipv4
37Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H. H. Ngu Firewall Queries. Search on Bibsonomy OPODIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Firewall Queries, Network Security, Firewalls
37Voravud Santiraveewan, Yongyuth Permpoontanalarp A Graph-based Methodology for Analyzing IP Spoofing Attack. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IP spoofing and Formal Method for Network Security, Network Security, Firewalls
37Steve Wood, Gordon W. Romney Protection methods against IP packet attacks. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TCP vulnerabilities, UDP vulnerabilities, packet inspection, intrusion detection systems, firewalls, access control list, intrusion prevention systems
37Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability
37Scott Hazelhurst, Adi Attar, Raymond Sinnappan Algorithms for Improving the Dependability of Firewall and Filter Rule Lists. Search on Bibsonomy DSN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Boolean decision diagrams, validation, filtering, firewalls, traffic management
37E. Strother Denial of Service Protection - The Nozzle. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource
37Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov, Kellogg S. Booth Investigating an appropriate design for personal firewalls. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2010 DBLP  DOI  BibTeX  RDF personal firewall, usable security
37Pablo Neira Ayuso, Laurent Lefèvre, Rafael Martinez Gasca hFT-FW: Hybrid Fault-Tolerance for Cluster-Based Stateful Firewalls. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Michael R. Horvath, Errin W. Fulp, Patrick S. Wheeler Policy Distribution Methods for Function Parallel Firewalls. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Diana von Bidder, David A. Basin, Germano Caronni Midpoints Versus Endpoints: From Protocols to Firewalls. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Subrata Acharya, Jia Wang 0001, Zihui Ge, Taieb Znati, Albert G. Greenberg Simulation Study of Firewalls to Aid Improved Performance. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Denis Caromel, Alexandre di Costanzo, Dennis Gannon, Aleksander Slominski Asynchronous Peer-to-PeerWeb Services and Firewalls. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Michael Stukas, Douglas C. Sicker An Evaluation of VoIP Traversal of Firewalls and NATs within an Enterprise Environment. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SIP, VoIP, firewall, enterprise, NAT
37Burton S. Kaliski Jr. On Hash Function Firewalls in Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Khalid Al-Tawil, Ibrahim A. Al-Kaltham Evaluation and testing of internet firewalls. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
37John T. McHenry, Patrick W. Dowd, Frank A. Pellegrino, Todd M. Carrozzi, W. B. Cocks An FPGA-based coprocessor for ATM firewalls. Search on Bibsonomy FCCM The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
36Csaba Simon, Attila Török ATM Security with Firewalls. Search on Bibsonomy ISCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ATM security, ATM signaling, firewalls
36Samuel Patton, David Doss, William Yurcik Open Source Versus Commercial Firewalls: Functional Comparison. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF corporate applications, commercial firewalls, security risks, Cisco, IOS firewall feature set, Internet, Internet, open source, open source software, open systems, network operating systems, authorisation, telecommunication security, virtual private network, business communication, Linux operating system
36Subrata Acharya Accelerating Firewalls: Tools, Techniques and Metrics for Optimizing Distributed Enterprise Firewalls. Search on Bibsonomy Handbook of Optimization The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Alex X. Liu, Mohamed G. Gouda Firewall Policy Queries. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Ana-Maria Ghiran, Gheorghe Cosmin Silaghi, Nicolae Tomai Ontology-Based Tools for Automating Integration and Validation of Firewall Rules. Search on Bibsonomy BIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF firewall management, Ontologies, rule-based reasoning
28Alex X. Liu Formal Verification of Firewall Policies. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Zobeideh Aliannezhadi, Mohammad Abdollahi Azgomi Modeling and Analysis of a Web Service Firewall Using Coloured Petri Nets. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28James Walden Integrating web application security into the IT curriculum. Search on Bibsonomy SIGITE Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF web security education, web application security
28Przemyslaw Krekora An approach to change availability of the service by adding forecasting module to firewall. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Bin Zhang 0007, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher Specifications of a high-level conflict-free firewall policy language for multi-domain networks. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF firewall, policy language, conflicts free
28Weiping Wang 0006, Wenhui Chen, Zhepeng Li, Huaping Chen 0001 Comparison Model and Algorithm for Distributed Firewall Policy. Search on Bibsonomy ICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia Analysis of Policy Anomalies on Distributed Network Security Setups. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Se-Chang Son, Bill Allcock, Miron Livny CODO: firewall traversal by cooperative on-demand opening. Search on Bibsonomy HPDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Avishai Wool A Quantitative Study of Firewall Configuration Errors. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège A Formal Approach to Specify and Deploy a Network Security Policy. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Victor Paulsamy, Samir Chatterjee Network Convergence and the NAT/Firewall Problems. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Tetsuya Oh-ishi, Koji Sakai, Tetsuya Iwata, Akira Kurokawa The Deployment of Cache Servers in P2P Networks for Improved Performance in Content-Delivery. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas A Unified Methodology for Verification and Synthesis of Firewall Configurations. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Alain J. Mayer, Avishai Wool, Elisha Ziskind Fang: A Firewall Analysis Engine. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Vulnerability Testing, Network Security, Firewall
28Mohammad Sajjad Hossain, Vijay Raghunathan AEGIS: a rule based framework for traffic gatekeeping in wireless sensor networks. Search on Bibsonomy IPSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network overlays, traffic gatekeeping, wireless sensor networks, firewalls
28Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens Complete analysis of configuration rules to guarantee reliable network security policies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Policy anomalies, Network security, Intrusion Detection systems, Firewalls
28Pablo Neira Ayuso, Laurent Lefèvre, Denis Barbaron, Rafael M. Gasca Towards a Dependable Architecture for Highly Available Internet Services. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stateful firewalls, Reliability, High Availability, active replication
28Asaad Moosa, Eanas Muhsen Alsaffar Proposing a hybrid-intelligent framework to secure e-government web applications. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF negative logic based filtering, positive logic based filtering, session based filtering, web application firewalls, whitelist, neural networks, fuzzy logic, e-government, web application, blacklist
28Roberto D. Rubino An open system for transparent firewall authentication and user traffic identification within corporate intranets. Search on Bibsonomy SIGITE Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, firewalls, packet marking
28Christian Grimm, Harald Schwier Empirical Analysis of TCP Variants and Their Impact on GridFTP Port Requirements. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TCP BIC, Congestion Control, Firewalls, High Performance Networking, GridFTP
28Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham Detection and Resolution of Anomalies in Firewall Policy Rules. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Security, Security Policy, Firewalls, Anomalies, Packet Filters
28Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato J. O. Figueiredo WOW: Self-Organizing Wide Area Overlay Networks of Virtual Workstations. Search on Bibsonomy HPDC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF self-organizing wide area overlay network, virtual workstation, WOW distributed system, peer-to-peer technique, user-level decentralized technique, IP packet, PVM-based fastDNAml application, virtual IP layer, virtual machine, local-area network, firewalls, WAN, cluster of workstations, high-throughput computing, client-server application
28Mark Allman On the performance of middleboxes. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF firewalls, TCP performance, middleboxes
28Ralf Ackermann, Utz Roedig, Michael Zink, Carsten Griwodz, Ralf Steinmetz Associating network flows with user and application information. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF network traffic marking, security, watermarking, firewalls
28P. C. Clark, M. C. Meissner, K. O. Vance Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure compartmented data access, untrusted network, COTS-based architecture, secure network computing architecture, application-level firewalls, DoD applications, software architecture, access control, electronic commerce, computer networks, authorisation, telecommunication security, electronic business, military computing, military applications, sensitive information, commercial-off-the-shelf products, sensitive data
28Samuel Patton, Bryan Smith, David Doss, William Yurcik A Virtual Private Network Deployment Framework. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF telecommunication network planning, layered VPN planning, virtual private network deployment, VPN technology, legacy networks, interoperability, network security, firewalls, open systems, survivability, authorisation, telecommunication security, business communication, telecommunication network reliability, legacy applications
28Pieter Liefooghe, Marnix Goossens An Architecture for Seamless Access to Multicast Content. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF seamless access, multicast content, transparent access, multicast infrastructure, dynamic tunnel server location, rare-based path characterization, UMTP, dynamic congestion discovery, tunnel hand-over mechanism, session directory application, session announcements, SAP/SDP proxy location, SAP/SDP query mechanism, IP multicast packets, computer networks, transport protocols, packet switching, firewalls, network architecture, multicast communication, authorisation, network servers
28Marcel Waldvogel Multi-Dimensional Prefix Matching Using Line Search. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF multidimensional prefix matching, filter database, 1D binary search, prefix lengths, transport header match, 5D IP, quality of service, quality of service, Internet, Internet, transport protocols, packet switching, Internet protocol, firewalls, search problems, QoS routing, telecommunication network routing, packet classification, VPN, virtual private networks, line search
28C. Cant, Simon R. Wiseman Simple Assured Bastion Hosts. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation
28Hermann Kopetz Why time-triggered architectures will succeed in large hard real-time systems. Search on Bibsonomy FTDCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF large hard real-time systems, encapsulated subsystems, temporal firewalls, sparse time base, replica determinism, time-triggered communication protocol, real-time systems, computational complexity, computer architecture, design principles, time-triggered architectures
28Moses Garuba, Chunmei Liu, Alicia Nicki Washington A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Venanzio Capretta, Bernard Stepien, Amy P. Felty, Stan Matwin Formal correctness of conflict detection for firewalls. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF firewall, coq
28Hazem H. Hamed, Adel El-Atawy, Ehab Al-Shaer On Dynamic Optimization of Packet Matching in High-Speed Firewalls. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten Bridging the gap between web application firewalls and web applications. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF run-time enforcement, shared data repository, web spplication girewall, static verification
28Nelson Baloian, José A. Pino, Marc Jansen Implementing the Coupled Objects Paradigm for Synchronizing Distributed Applications Through Firewalls. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Nelson A. Baloian, Marc Jansen, José A. Pino MatchMaker - A Flexible Synchronizing Mechanism for Distributed Applications through Firewalls. Search on Bibsonomy CSCWD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Stephen J. Tarsa, Errin W. Fulp Balancing Trie-Based Policy Representations for Network Firewalls. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Livio Riciulli Advanced networks - High speed firewalls: securing the 10 gigabit ethernet WAN. Search on Bibsonomy SC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Errin W. Fulp, Stephen J. Tarsa Trie-Based Policy Representations for Network Firewalls. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo On Securing RTP-Based Streaming Content with Firewalls. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF streaming content, Network security, firewall
28Ingo Melzer, Mario Jeckle Using Corporate Firewalls for Web Services Trust. Search on Bibsonomy ICWS-Europe The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Marco Cremonini, Sabrina De Capitani di Vimercati, Ernesto Damiani, Pierangela Samarati An XML-based approach to combine firewalls and web services security specifications. Search on Bibsonomy XML Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF service security, Web services, network security, firewall, SOAP
Displaying result #1 - #100 of 803 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license