{"id":"https://openalex.org/W2148974720","doi":"https://doi.org/10.1109/discex.2003.1194927","title":"Distributed embedded firewalls with virtual private groups","display_name":"Distributed embedded firewalls with virtual private groups","publication_year":2004,"publication_date":"2004-03-22","ids":{"openalex":"https://openalex.org/W2148974720","doi":"https://doi.org/10.1109/discex.2003.1194927","mag":"2148974720"},"language":"en","primary_location":{"id":"doi:10.1109/discex.2003.1194927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055084287","display_name":"Tom Markham","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"T. Markham","raw_affiliation_strings":["Secure Computing Corporation, USA"],"affiliations":[{"raw_affiliation_string":"Secure Computing Corporation, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088378848","display_name":"L.M. Meredith","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"L. Meredith","raw_affiliation_strings":["Secure Computing Corporation, USA"],"affiliations":[{"raw_affiliation_string":"Secure Computing Corporation, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012825443","display_name":"Charles Payne","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"C. Payne","raw_affiliation_strings":["Secure Computing Corporation, USA"],"affiliations":[{"raw_affiliation_string":"Secure Computing Corporation, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055084287"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.3165,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.80686415,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"81","last_page":"83"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.9144653677940369},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.8203698396682739},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.72314453125},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6738386154174805},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.6735367178916931},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.6703537702560425},{"id":"https://openalex.org/keywords/context-based-access-control","display_name":"Context-based access control","score":0.6168562769889832},{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.5492461323738098},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4881935715675354},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.4469519853591919},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3798091411590576},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3526471257209778},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.22495785355567932},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.14088663458824158},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.07970172166824341}],"concepts":[{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.9144653677940369},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.8203698396682739},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72314453125},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6738386154174805},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.6735367178916931},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.6703537702560425},{"id":"https://openalex.org/C42934231","wikidata":"https://www.wikidata.org/wiki/Q1128692","display_name":"Context-based access control","level":5,"score":0.6168562769889832},{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.5492461323738098},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4881935715675354},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.4469519853591919},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3798091411590576},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3526471257209778},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.22495785355567932},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.14088663458824158},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.07970172166824341},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C2776401274","wikidata":"https://www.wikidata.org/wiki/Q3756855","display_name":"Accretion (finance)","level":2,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/discex.2003.1194927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/discex.2003.1194927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings DARPA Information Survivability Conference and Exposition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W1928847439"],"related_works":["https://openalex.org/W2372629054","https://openalex.org/W2369691585","https://openalex.org/W2349986472","https://openalex.org/W2382066006","https://openalex.org/W2371002765","https://openalex.org/W1599851322","https://openalex.org/W2351329971","https://openalex.org/W2327318552","https://openalex.org/W2383966119","https://openalex.org/W2380564194"],"abstract_inverted_index":{"This":[0],"paper":[1,23],"introduces":[2],"distributed":[3],"embedded":[4],"firewall,":[5],"a":[6,29],"new":[7],"architecture":[8,48],"designed":[9],"to":[10,37,68],"counter":[11],"the":[12,39,47,50,69],"insider":[13],"threat,":[14],"which":[15],"is":[16],"undeterred":[17],"by":[18],"existing":[19],"firewall":[20,61],"implementations.":[21],"The":[22,60],"also":[24],"describes":[25],"virtual":[26],"private":[27],"groups,":[28],"group":[30],"VPN":[31],"technology.":[32,44],"These":[33],"technologies":[34],"work":[35],"together":[36],"addresses":[38],"security":[40],"challenges":[41],"of":[42],"emerging":[43],"We":[45],"describe":[46],"and":[49],"rationale":[51],"for":[52],"its":[53,58],"design,":[54],"then":[55],"we":[56],"illustrate":[57],"application.":[59],"technology":[62],"has":[63],"been":[64],"transitioned":[65],"from":[66],"DARPA":[67],"COTS":[70],"3Com":[71],"Embedded":[72],"Firewall.":[73]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
