Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,499,896 papers from all fields of science
Search
Sign In
Create Free Account
Application firewall
Known as:
Application layer firewall
, Database firewall
, Application-layer firewall
Expand
An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service. It operates by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
AppArmor
AppShield
Application delivery controller
Application delivery network
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
IP Based Traffic Recovery: An Optimal Approach using SDN Application for Data Center Network
Ahmed Mateen
,
Qaiser Abbas
arXiv.org
2017
Corpus ID: 1871968
With the passage of time and indulgence in Information Technology, network management has proved its significance and has become…
Expand
2016
2016
Application Layer Security for CoAP using the (D)TLS Record Layer
Sara Garcia
,
R. López
,
D. Garcia
2016
Corpus ID: 195951103
This document briefly describes an idea to provide Application-Layer Security for CoAP using (D)TLS Record Layer, assuming it is…
Expand
2014
2014
Detecting Hybrid Botnets with Web Command and Control Servers or Fast Flux Domain
Chia-Mei Chen
,
Ming-Zong Huang
,
Ya-Hui Ou
J. Inf. Hiding Multim. Signal Process.
2014
Corpus ID: 198938305
,
2011
2011
An Intelligent System for Decision Making in Firewall Forensics
Hassina Bensefia
,
Nacira Ghoualmi Zine
Digital Information and Communication Technology…
2011
Corpus ID: 31022385
The firewall log files trace all incoming and outgoing events in a network. Their content can include details about network…
Expand
2010
2010
Information Security in Maritime Domain Awareness
Yilmaz Vural
,
M. E. Çiftçibaşi
,
S. Inan
2010
Corpus ID: 33259669
Abstract : Maritime Domain Awareness (MDA) is achieved by interoperability of maritime information systems. Maritime information…
Expand
2005
2005
Towards Database Firewalls
Kun Bai
,
A. Wang
,
Peng Liu
Database Security
2005
Corpus ID: 13434840
Authentication based access control and integrity constraints are the major approaches applied in commercial database systems to…
Expand
2004
2004
"Policy-Maker": a toolkit for policy-based security management
A. Pilz
IEEE/IFIP Network Operations and Management…
2004
Corpus ID: 15394138
"Policy-Maker" is an implementation of our concept for the security management of heterogeneous networks. It is entirely based on…
Expand
2002
2002
Application layer security method and system
유벌 벤-잇작
2002
Corpus ID: 69985479
2A shows an application layer security system 200 according to an embodiment of the invention. In particular, the protective…
Expand
2000
2000
The Problem of End-to-end Security for Proxy-based Systems
M. Portmann
2000
Corpus ID: 14325117
Proxies can provide valuable services for today’s increasingly heterogeneous computing environment by providing various kinds of…
Expand
2000
2000
CORBA Firewall Security: Increasing the Security of CORBA Applications 1
H. Abie
2000
Corpus ID: 797224
Traditional network firewalls prevent unauthorised access and attacks by protecting the points of entry into the network…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE