Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Dalian University of Technology》 2003-S1
Add to Favorite Get Latest Update

Research on key techniques of distributed firewall

WANG Wei*, CAO Yuanda ( Dept. of Comput. Sci. and Eng., Beijing Inst. of Technol., Beijing 100081, China )  
This paper indicates the limitation of traditional firewall and presents the key techniques of distributed firewall, and designs an XML-based network information description way and a hierarchical network security management platform to integrate the distributed firewall. The distributed firewall forms a network safeguard system by overcoming the traditional firewall limitation of depending on network topology.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 8 Hits
1 ZHAENG Song,LIANG Chang-yong(School of Management,Hefei University of Technology,Hefei 230009,China);Distributed firewall and it's application in the enterprise network[J];Journal of Anhui Institute of Architecture & Industry(Natural Science);2006-03
2 JIA Xiao-jing1,XIAO Hui-jin2 (1.School of Computer Science,Gansu Institute Political Science and Law ,Lanzhou Gansu 730070,China 2.Department of Physics, Daxian Teachers College,Dazhou Sichuan 635000,China);The Safety Technology of Network Based on Firewall[J];Journal of Daxian Teachers College;2005-02
3 QIU Jian (Lanzhou newspaper office,Lanzhou 730000);Fire wall technique and network security[J];Electronic Instrumentation Customer;2007-03
4 Li Yongxia (Chongqing City Management Professional College,Chongqing 400055);Distributed Fire Wall Technology and Its Application[J];Computer & Telecommunication;2007-03
5 Yang Zhenting;A Research of Distributed Firewalls[J];Computer & Digital Engineering;2007-02
6 MIU Feng1, ZHANG Kun2 (1. Information Center, Southwest University of Political Science and Law, Chongqing 401120, China; 2. Department of Computer Science, Chongqing Vocational Institute of Engineering, Chongqing 400037, China);Distributed DFW network management platform system based on LDAP[J];Computer Engineering and Design;2009-07
7 Liu Jie-yu Ren Xin-hua (Taiyuan University of Technology,Taiyuan Shanxi 030024,China);Design and Realizaiton of Host Firewall in Distributed Firewall System[J];Shanxi Electronic Technology;2008-03
8 HUANG Ben-xiong , YAO Zhen (Electronic and Information Engineering Department of Huazhong Science and Technology University , Wuhan 430074,China);Realization Technology of Modern Firewall[J];Tianjin Communications Technology;2004-02
Chinese Journal Full-text Database 10 Hits
1 Li Xiang Li Xiaowen Liu Suhong Li Min(School of Geography;State Key Laboratory of Remote Sensing Science;Key Laboratory for Remote Sensing of Environment and Digital Cities: Beijing Normal University,100875,Beijing,China);A STUDY ON E-TOWN DATABASE OF PUBLIC INFORMATION BASED ON METADATA KEY TECHNOLOGY[J];Journal of Beijing Normal University(Natural Science);2006-04
2 Huang Hua-lin(Guangdong Women's Polytechnic College,Guangzhou,511450);A Simple Realization of RSS Online Reading[J];Journal of Baoshan Teachers College;2006-05
3 QIU Jun (Department of Business Administration, Chongqing Institute of Technology, Chongqing 400050,China);How to Use DOM to Treat XML Documents Effectively[J];Journal of Chongqing Institute of Technology Management;2002-02
4 GAO Ning~1 DU Jianqiang~2 LIU Yanheng~2 (1.College of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022; 2.College of Computer Science and Technology,Jilin University,Changchun 130012);Design and Implementation of B/S Architecture Based on XML[J];Journal of Changchun Institute of Optics and Fine Mechanics;2005-01
5 HAN Zhi-gang②, QIN Fen②, CUI Cai-hui②(China-Australia Cooperative Research Institute for Geographic Information Analysis and Applications, Henan University,475004,Kaifeng,China; ②College of Environmental & Planning, Henan University,Kaifeng,475004,China);The design and realization of distributed cadastral alteration system based on J2EE[J];Science of Surveying and Mapping;2008-01
6 QU Zhao-yang,YANG Yan-wen(Department of Information Engineering, Northeast China Institute of Electric Power Engineering,Jilin City,132012);The Making Model and Realization of Statistic Excel Report in B/S Software[J];Journal of Northeast China Institute of Electric Power Engineering(Natural Science Edition);2004-04
7 XIONG Jin-lei(Huazhong University of Science and Technology,Wuhan 430000,China);The Design of Definition Tools that Based on the Graphical Modeling[J];Computer Knowledge and Technology;2005-35
8 WANG Dong (Tibet Nationalities Institute,Xianyang 712082,China);Research on Integration Model of Data Based on XML[J];Computer Knowledge and Technology;2006-29
9 LI Zhi-qiang, ZHANG Shao-hua, LI Ya-fang (Coll of Inf Engin, Yangzhou Univ, Yangzhou 225009, China; Soc Dev Sec, Jiangsu Sci & Tech Dept, Nanjing 210008, China);The Implementation of Dynamic User Interface Based on XML[J];Computer Knowledge and Technology;2006-36
10 WANG Hui (Anhui University of Science & Technology, Huainan 232001, China);Research Based on SAX Documents Analysis Technology[J];Computer Knowledge and Technology;2006-36
China Proceedings of conference Full-text Database 2 Hits
1 YOU Wen Jie;Fulfill Data Search of XML Document by Javascript[A];[C];2003
2 HU Min ZHOU Guo-xiang School of Computer and Information, Hefei University of Technology, Hefei 230009, China;Apply XML Technology in the Systems Integration of Intelligent Building[A];[C];2007
Chinese Journal Full-text Database 10 Hits
1 LI Jian, LIU Mei-hua & CAO Yuan-da (Information Security Research Center, Department of Computer Science, Beijing Institute of Technology, Beijing 100081, China);DISTRIBUTED FIREWALLS SYSTEM[J];Journal of Safety and Environment;2002-01
2 YU Jian-ping1, XIE Wei-xin1 ,YAN Qiao2(1.College of Information Engineering, Shenzhen University, Shenzhen 518060, China;2.School of Electronic Engineering, Xidian University, Xi’an 710071, China);Network security and its defence techniques[J];Semiconductor Technology;2002-01
3 WANG Jiang-feng,MU Yong-min,LI Mei-gui(Department of Computer Science & Engineering,Beijing Information Technology Institute,Beijing 100101,China);Research of Linux-based bridge-firewall[J];Journal of Beijing Institute of Machinery;2006-02
4 GAO Xiang, ZHOU Lin (Chongqing University of Posts and Telecommunications,Chongqing 400065,P.R.China);802.1x protocol and its application in the broadband access networks[J];Journal of Chongqing University of Posts and Telecommunications;2004-01
5 ZHU Liang, TAN Xiang-ru (Changsha University of Science & Technology, Changsha 410077,China);A Data Mining Method of Decision Tree for XML Document[J];Journal of Changsha University of Electric Power(Natural Science);2004-02
6 ZHANG Yong de,LI Xiu yan,WANG Yan ping (Institute of Information Science and Technology,Beijing University of Chemical Technology,Beijing City 100029);Security Analysis of the IEEE 802.1x Protocol[J];Journal of Northeast China Institute of Electric Power Engineering;2003-02
7 LIU Zhe,WANG Wei-ran (School of Electronic Engineering, UEST of China Chengdu 610054);Study of Distributed Firewall Based Security System[J];Journal of University of Electronic Science and Technology of China;2005-03
8 QIAN Wei-zhong1,WANG Wei-ran1,YUAN Hong-chun2 (1. School of Electronic Engineering, UEST of China Chengdu 610054; 2. School of Computer Science and Engineering,UEST of China Chengdu 610054);Boundary Defense System Based on DFW[J];Journal of University of Electronic Science and Technology of China;2005-04
9 ZHANG Chu-xiong,XU Wen-zhao(Nanjing University of Posts and Telecommunications,Nanjing 210003,China);Improvement of distributed firewall model[J];Telecommunications for Electric Power System;2006-05
10 LI Shou-peng 1,SUN Hong-bo 2 (1.College of Mathematics,Sichuan University,Chengdu,Sichuan 610063,China; 2.Dept of Computer Science & Technology,Beijing Electronic Science and Technology Institute,Beijing 100070,China);Security Policies Study for Information Systems[J];Acta Electronica Sinica;2003-07
【Secondary References】
Chinese Journal Full-text Database 6 Hits
1 HU Rui-qing, TIAN Jie-rong (Naval Flying Academy,Huludao 125001, China);Some Thoughts About Network Security and Protection[J];Computer Knowledge and Technology;2008-16
2 Li Yongxia (Chongqing City Management Professional College,Chongqing 400055);Distributed Fire Wall Technology and Its Application[J];Computer & Telecommunication;2007-03
3 GUO Li-chun(Vocational College,Liaoning Technical Univercity,Liaoning Fuxin 123000);Application of distributed firewalls technology in network security[J];Journal of Shenyang Institute of Aeronautical Engineering;2006-03
4 Yang Zhenting;A Research of Distributed Firewalls[J];Computer & Digital Engineering;2007-02
5 LIAO Yong-hong1,LI Luo1,HUANG Zhan2(1.Department of Computer Technology,College of Guangdong Industry Technical,Guangzhou 510300,China;2.Department of Computer Science,School of Information Science and Technology,Jinan University,Guangzhou 510300,China);Technology of IP content based on Windows200x WDM[J];Computer Engineering and Design;2007-22
6 ZHOU Yi-Lu,ZHONG Jian,LIU Lin-sen,LUO LiangInformation Center of Southwest University,Chongqing 400716,China;Design and Implementation of a Network User Management System Based on Security Policy[J];Journal of Southwest University(Natural Science Edition);2007-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved