Model-Based Tool-Assistance for Packet-Filter Design and its Future
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 1
Abstract
Firewall is a device that secure the private network from unauthorized access. Model based  tool assistance  facilitate the design task and has contribute to the correctness of the filters. But the model based tool assistance approach is design time only does not manage actions at run time. So we shall propose model on run time auditing architecture to detect the attack while packet filtering in firewall technology. It is usually based on the log-files of the packet-filters.
Authors and Affiliations
Gurvinder Kaur, Dr. S. N. Panda, Dr. Dalvinder Singh Dhaliwal
Semantic Web for Virtual University Using XML and Relational Database
In this paper a development of virtual university semantic web service is focused. This approach uses XML, relational database and development of a web application to store, retrieve, and transfer operative notes between...
Nano Whiskers ..A “BIG” discussion on “SMALL” things..
Technologyis shrinking fast. Computing technology that would have filled awarehouse 30 years ago can now be squeezed onto a chip a fraction ofthe size of your thumbnail. The very smallest scale of engineering is called n...
Given a raga recording, can we scientifically verify which school of Vadi-Samvadi selection is supported by the artist?
The notes which play the most important and second most important roles in expressing a raga are called Vadi and Samvadi swars respectively in (North) Indian Classical music. Like Bageshree, Bhairavi, Shankara, Hamir and...
ON SOME DOUBLE INTEGRALS INVOLVING -FUNCTION OF TWO VARIABLES AND SPHEROIDAL FUNCTIONS
The present paper evaluates certain double integrals involving -function of two variables [21] and Spherodial functions [23]. These double integrals are of most general character known so far and can be suitably speciali...
An Energy Efficient Data Transfer Mechanism for Wireless Sensor Network
Wireless Sensor Networks (WSNs) are generally energy and resource constrained. In most WSN applications the traffic pattern is from sensor-to-sink and for effective utilization of available resources in network data aggr...