{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:10:55Z","timestamp":1694621455997},"reference-count":11,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003,5,1]]},"abstract":"Proposes the use of a special purpose drop\u2010in firewall\/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Sieve is meant to be used like an external modem: the user only needs to plug it in. Its existence is transparent to the user, requiring no modification to the workstation configuration. To function in this role, Sieve has been designed to be compact, low\u2010cost, requiring little administration or maintenance. Discusses the features and advantages of the system and demonstrates how Sieve was used in various application areas (home, university environment, etc.).<\/jats:p>","DOI":"10.1108\/10662240310469763","type":"journal-article","created":{"date-parts":[[2003,4,18]],"date-time":"2003-04-18T23:08:54Z","timestamp":1050707334000},"page":"107-115","source":"Crossref","is-referenced-by-count":5,"title":["Drop\u2010in security for distributed and portable computing elements"],"prefix":"10.1108","volume":"13","author":[{"given":"Vassilis","family":"Prevelakis","sequence":"first","affiliation":[]},{"given":"Angelos","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022022020375785200_B1","doi-asserted-by":"crossref","unstructured":"Atkinson, R. (1995), \u201cRFC\u20101825: security architecture for the Internet protocol\u201d, Internet Engineering Task Force.","DOI":"10.17487\/rfc1825"},{"key":"key2022022020375785200_B2","unstructured":"Boscia, N.K. and Shaw, D.G. (2000), Wireless Firewall Gateway White Paper, NASA Advanced Supercomputing Division, Moffett Field, CA."},{"key":"key2022022020375785200_B3","unstructured":"Cheswick, W. and Bellovin, S.M. (1994), Firewalls and Internet Security, Repelling the Wily Hacker, Addison\u2010Wesley Professional Computing Series, Reading, MA."},{"key":"key2022022020375785200_B4","unstructured":"da Silva, J. (1998), \u201cCruchgen\u201d, OpenBSD User Manual, OpenBSD.org"},{"key":"key2022022020375785200_B5","unstructured":"Denker, J.S., Bellovin, S.M., Daniel, H., Mintz, N.L., Killian, T. and Plotnick, M.A. (1999), \u201cMoat: a virtual private network appliance and services platform\u201d, paper presented at the LISA\u201999: 13th Systems Administration Conference, Washington, DC."},{"key":"key2022022020375785200_B6","doi-asserted-by":"crossref","unstructured":"Ioannidis S., Keromytis, A.D., Bellovin, S.M. and Smith, J.M. (2000), \u201cImplementing a distributed firewall\u201d, Proceedings of Computer and Communications Security (CCS), pp. 190\u20109.","DOI":"10.1145\/352600.353052"},{"key":"key2022022020375785200_B7","unstructured":"Keromytis, A.D. and Wright, J.L. (2000), \u201cTransparent network security policy enforcement\u201d, paper presented at the USENIX Annual 2000 Technical Conference \u2013 Freenix Refereed Track, San Diego, CA."},{"key":"key2022022020375785200_B8","doi-asserted-by":"crossref","unstructured":"Prevelakis, V. (1999), \u201cA secure station for network monitoring and control\u201d, paper presented at the 8th USENIX Security Symposium, Washington, DC.","DOI":"10.1007\/978-0-387-35575-7_9"},{"key":"key2022022020375785200_B9","unstructured":"Scott, C., Wolfe, P. and Erwin, M. (1998), Virtual Private Networks, O\u2019Reilly & Associates, Inc., Sebastapol, CA."},{"key":"key2022022020375785200_B10","unstructured":"Shah, D. and Holzbaur, H. (1997), \u201cVirtual private networks: security with an uncommon touch\u201d, Data Communications, Vol. 26 No. 12, pp. 52\u201061."},{"key":"key2022022020375785200_B11","unstructured":"Stubblefield, A., Ioannidis, J. and Rubin, A.D. (2002), \u201cUsing the Fluhrer, Mantin, and Shamir attack to Break WEP\u201d, Proceedings of the 2002 Network and Distributed System Security Symposium, San Diego, CA."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240310469763","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240310469763\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240310469763\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T03:40:23Z","timestamp":1645501223000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240310469763\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5,1]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,5,1]]}},"alternative-id":["10.1108\/10662240310469763"],"URL":"https:\/\/doi.org\/10.1108\/10662240310469763","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2003,5,1]]}}}