کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
726321 1461279 2007 6 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Design and analysis of firewall-penetrated scheme based on trusted host
موضوعات مرتبط
مهندسی و علوم پایه سایر رشته های مهندسی مهندسی برق و الکترونیک
پیش نمایش صفحه اول مقاله
Design and analysis of firewall-penetrated scheme based on trusted host
چکیده انگلیسی

On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper. Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the firewall-penetrated technology based on trusted host is analyzed under the firewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: The Journal of China Universities of Posts and Telecommunications - Volume 14, Issue 1, March 2007, Pages 39-44