By Topic

The Firewall Technology Study of Network Perimeter Security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Huang Ling-Fang ; Inst. of Math. & Comput. Sci., Jiangxi Sci. Technol. Normal Univ., Nanchang, China

The edge networks that are contained within individual organizations and households can be found at various locations across the Internet. Within the current Internet which is much larger and deeper, edge networks with no protection or with limited protection are invaded time and time again by malicious user. A method to protecting an edge network against intruders is referred to as perimeter security. The firewall technology is a successful adaptation of this method in the era of computer networks. This paper presents firewall technologies and basic structures.

Published in:

Services Computing Conference (APSCC), 2012 IEEE Asia-Pacific

Date of Conference:

6-8 Dec. 2012