Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,227,146 papers from all fields of science
Search
Sign In
Create Free Account
Firewall (computing)
Known as:
Host-based firewall
, Packet filtering
, Firewall
Expand
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Centrino
Cisco 12000
Cisco MARS
Cloud testing
Expand
Broader (2)
Cyberwarfare
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Software-Defined Networking: A Comprehensive Survey
J. Esch
Proceedings of the IEEE
2015
Corpus ID: 1939479
The Internet’s astounding success is based on a principle of distributed control and transport protocols in routers and switches…
Expand
Highly Cited
2012
Highly Cited
2012
Black holes: complementarity or firewalls?
Ahmed Almheiri
,
D. Marolf
,
J. Polchinski
,
J. Sully
2012
Corpus ID: 55581818
A bstractWe argue that the following three statements cannot all be true: (i) Hawking radiation is in a pure state, (ii) the…
Expand
Review
2010
Review
2010
The management of security in Cloud computing
S. Ramgovind
,
M. Eloff
,
E. Smith
Information Security for South Africa
2010
Corpus ID: 12274022
Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible…
Expand
Highly Cited
2004
Highly Cited
2004
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
S. Baset
,
H. Schulzrinne
Proceedings IEEE INFOCOM . 25TH IEEE…
2004
Corpus ID: 370766
Skype is a peer-to-peer VoIP client developed in 2003 by the organization that created Kazaa. Skype claims that it can work…
Expand
Review
2003
Review
2003
Firewalls and internet security - repelling the wily hacker
B. Cheswick
,
S. Bellovin
Addison-Wesley professional computing series
2003
Corpus ID: 109300660
From the Book: But after a time, as Frodo did not show any sign of writing a book on the spot, the hobbits returned to their…
Expand
Highly Cited
2002
Highly Cited
2002
Automated generation and analysis of attack graphs
Oleg Sheyner
,
J. Haines
,
S. Jha
,
R. Lippmann
,
Jeannette M. Wing
Proceedings IEEE Symposium on Security and…
2002
Corpus ID: 8378169
An integral part of modeling the global view of network security is constructing attack graphs. Manual attack graph construction…
Expand
Highly Cited
2001
Highly Cited
2001
The Ponder Policy Specification Language
N. Damianou
,
Naranker Dulay
,
Emil C. Lupu
,
M. Sloman
IEEE International Symposium on Policies for…
2001
Corpus ID: 61687729
The Ponder language provides a common means of specifying security policies that map onto various access control implementation…
Expand
Review
2000
Review
2000
A survey of trust in internet applications
T. Grandison
,
M. Sloman
IEEE Communications Surveys and Tutorials
2000
Corpus ID: 9240891
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of…
Expand
Highly Cited
1999
Highly Cited
1999
SIP: Session Initiation Protocol
M. Handley
,
H. Schulzrinne
,
E. Schooler
,
J. Rosenberg
Request for Comments
1999
Corpus ID: 12876313
14 The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol for creating, 15 modifying, and…
Expand
Highly Cited
1999
Highly Cited
1999
A Security Architecture for the Internet Protocol
P. Cheng
,
J. Garay
,
A. Herzberg
,
H. Krawczyk
IBM Systems Journal
1999
Corpus ID: 875463
In this paper we present the design, rationale, and implementation of a security architecture for protecting the secrecy and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE