CFP last date
20 January 2025
Reseach Article

Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database

by Dr. S. Arumugam, P. Senthilkumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 1
Year of Publication: 2010
Authors: Dr. S. Arumugam, P. Senthilkumar
10.5120/793-1126

Dr. S. Arumugam, P. Senthilkumar . Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database. International Journal of Computer Applications. 4, 1 ( July 2010), 37-41. DOI=10.5120/793-1126

@article{ 10.5120/793-1126,
author = { Dr. S. Arumugam, P. Senthilkumar },
title = { Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database },
journal = { International Journal of Computer Applications },
issue_date = { July 2010 },
volume = { 4 },
number = { 1 },
month = { July },
year = { 2010 },
issn = { 0975-8887 },
pages = { 37-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume4/number1/793-1126/ },
doi = { 10.5120/793-1126 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:51:58.405224+05:30
%A Dr. S. Arumugam
%A P. Senthilkumar
%T Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database
%J International Journal of Computer Applications
%@ 0975-8887
%V 4
%N 1
%P 37-41
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The society has grown to rely on internet services, and the number of internet client increases every day. As more users are connected to the network, millions a user to do their damage becomes very great and lucrative. In conventional firewall rely on topology restrictions and controlled network entry points to enforce packet filtering. In this paper, I propose method of multiple firewall concepts and also maintain the database for both the authorized and unauthorized entry details based on security policy to enforce the static and dynamic packet filtering. This technique is implemented in software tool called distributed firewall policy advisor and specialized database (SDB).

References
Index Terms

Computer Science
Information Sciences

Keywords

Firewall Distributed Firewall policy Language policy verification Specialized Database(SDB) Distributed firewall policy Advisor(DFPA)