Guangzhi Jiang

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The deployment of the IPv6 network becomes to be realized as the necessity of the IPv6 network is enlarged due to the limit of the IPv4 network. However, the security policy about the IPv6 network is not mature and it becomes an obstacle in the IPv6 network deployment. Attackers can detour the access control of packet filtering system, unless packet(More)
Software credibility refers to the matching degree between the expected result and system behavior in the real running environment. This paper focuses on the application of software creditability verification method based on the application behavior declaration (ABD), in which the application of software credibility validation process and the software(More)
IPv6, as the alternative of IPv4, contains numerous features and improvements that make it attractive from a security perspective, but it is by no means the panacea for security. This paper presents the design and implementation of a distributed intelligent firewall system based on IPv6, which is able to secure the network layer and application layer of(More)
  • 1