Research Article

Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database

by  Dr. S. Arumugam, P. Senthilkumar
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Issue 1
Published: July 2010
Authors: Dr. S. Arumugam, P. Senthilkumar
10.5120/793-1126
PDF

Dr. S. Arumugam, P. Senthilkumar . Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database. International Journal of Computer Applications. 4, 1 (July 2010), 37-41. DOI=10.5120/793-1126

                        @article{ 10.5120/793-1126,
                        author  = { Dr. S. Arumugam,P. Senthilkumar },
                        title   = { Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 4 },
                        number  = { 1 },
                        pages   = { 37-41 },
                        doi     = { 10.5120/793-1126 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Dr. S. Arumugam
                        %A P. Senthilkumar
                        %T Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database%T 
                        %J International Journal of Computer Applications
                        %V 4
                        %N 1
                        %P 37-41
                        %R 10.5120/793-1126
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The society has grown to rely on internet services, and the number of internet client increases every day. As more users are connected to the network, millions a user to do their damage becomes very great and lucrative. In conventional firewall rely on topology restrictions and controlled network entry points to enforce packet filtering. In this paper, I propose method of multiple firewall concepts and also maintain the database for both the authorized and unauthorized entry details based on security policy to enforce the static and dynamic packet filtering. This technique is implemented in software tool called distributed firewall policy advisor and specialized database (SDB).

References
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Firewall Distributed Firewall policy Language policy verification Specialized Database(SDB) Distributed firewall policy Advisor(DFPA)

Powered by PhDFocusTM