{"id":"https://openalex.org/W1589995616","doi":"https://doi.org/10.1109/icpads.2002.1183435","title":"A mobile-agent based distributed dynamic /spl mu/Firewall architecture","display_name":"A mobile-agent based distributed dynamic /spl mu/Firewall architecture","publication_year":2002,"publication_date":"2002-01-01","ids":{"openalex":"https://openalex.org/W1589995616","doi":"https://doi.org/10.1109/icpads.2002.1183435","mag":"1589995616"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpads.2002.1183435","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110369676","display_name":"Feng Xian","orcid":"https://orcid.org/0000-0003-4929-3601"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"funder","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"None Feng Xian","raw_affiliation_strings":["Internet & Cluster Comput. Center, Huazhong Univ. of Sci. & Technol., Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Internet & Cluster Comput. Center, Huazhong Univ. of Sci. & Technol., Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"funder","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Jin","raw_affiliation_strings":["Internet & Cluster Comput. Center, Huazhong Univ. of Sci. & Technol., Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Internet & Cluster Comput. Center, Huazhong Univ. of Sci. & Technol., Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084196306","display_name":"Ke Liu","orcid":"https://orcid.org/0000-0002-4471-3171"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"funder","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"None Ke Liu","raw_affiliation_strings":["Internet & Cluster Comput. Center, Huazhong Univ. of Sci. & Technol., Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Internet & Cluster Comput. Center, Huazhong Univ. of Sci. & Technol., Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102155841","display_name":"Zongfen Han","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"funder","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"None Zongfen Han","raw_affiliation_strings":["Internet & Cluster Comput. Center, Huazhong Univ. of Sci. & Technol., Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Internet & Cluster Comput. Center, Huazhong Univ. of Sci. & Technol., Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.186,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":6,"citation_normalized_percentile":{"value":0.662528,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":76},"biblio":{"volume":null,"issue":null,"first_page":"431","last_page":"436"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.7197908},{"id":"https://openalex.org/keywords/context-based-access-control","display_name":"Context-based access control","score":0.6183671},{"id":"https://openalex.org/keywords/mobile-agent","display_name":"Mobile agent","score":0.56777257}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7299608},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.7197908},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.63956153},{"id":"https://openalex.org/C42934231","wikidata":"https://www.wikidata.org/wiki/Q1128692","display_name":"Context-based access control","level":5,"score":0.6183671},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.569386},{"id":"https://openalex.org/C84875433","wikidata":"https://www.wikidata.org/wiki/Q3277848","display_name":"Mobile agent","level":2,"score":0.56777257},{"id":"https://openalex.org/C77290126","wikidata":"https://www.wikidata.org/wiki/Q5283128","display_name":"Distributed System Security Architecture","level":5,"score":0.5612303},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5489524},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.51768565},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5068689},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4957131},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4440903},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4391692},{"id":"https://openalex.org/C2778059363","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Intranet","level":3,"score":0.43728206},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.42304993},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.41753447},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.3671757},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34602663},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2680877},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.22868142},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20065847},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.13193545},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpads.2002.1183435","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.62}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W1526098002","https://openalex.org/W1599126799","https://openalex.org/W1618548847","https://openalex.org/W1638541869","https://openalex.org/W1859131989","https://openalex.org/W1860215963","https://openalex.org/W1919975508","https://openalex.org/W1928847439","https://openalex.org/W1958859150","https://openalex.org/W2060189343","https://openalex.org/W2166975838","https://openalex.org/W342293290","https://openalex.org/W50542560","https://openalex.org/W654503046"],"related_works":["https://openalex.org/W4310291187","https://openalex.org/W4240856555","https://openalex.org/W2891274976","https://openalex.org/W2592819086","https://openalex.org/W2583381754","https://openalex.org/W2495628081","https://openalex.org/W2393767664","https://openalex.org/W2361515550","https://openalex.org/W2144255176","https://openalex.org/W2046094884"],"abstract_inverted_index":{"With":[0],"the":[1,54,74,102,106,113],"development":[2],"of":[3],"enterprise":[4],"Intranet":[5],"and":[6,52,65,82,93,96,120,132],"cluster":[7],"servers,":[8],"many":[9],"emerging":[10],"security":[11,28,49,103,122,126],"challenges":[12],"could":[13],"not":[14],"be":[15],"solved":[16],"by":[17],"conventional":[18],"firewall":[19],"due":[20],"to":[21,68,90,115],"its":[22],"inner":[23],"deficiency.":[24],"To":[25],"address":[26],"these":[27],"problems,":[29],"we":[30],"present":[31],"a":[32,47,62,87],"mobile-agent":[33],"based":[34],"distributed":[35,79,125],"dynamic":[36,48,121],"/spl":[37,57],"mu/Firewall":[38,58],"architecture.":[39],"In":[40],"this":[41],"architecture,":[42],"special":[43],"mobile":[44],"agents":[45],"implement":[46],"policy":[50,104],"reconfiguration":[51],"enhance":[53],"scalability.":[55],"Each":[56],"is":[59,128],"built":[60],"with":[61],"packet":[63],"filter":[64],"DTE-enhanced":[66],"evaluator":[67],"provide":[69],"dual":[70],"fine-grain":[71],"protection":[72],"at":[73],"individual":[75],"host":[76],"level.":[77],"A":[78],"intrusion":[80,118],"detection":[81],"response":[83,89],"(DIDR)":[84],"system":[85,111],"provides":[86,112],"fast":[88],"both":[91],"external":[92],"internal":[94],"attacks,":[95],"allows":[97],"an":[98],"adaptive":[99],"change":[100],"in":[101,105],"protected":[107],"network.":[108],"The":[109,124],"DIDR":[110],"infrastructure":[114],"support":[116],"hierarchical":[117],"responses":[119],"capabilities.":[123],"architecture":[127],"scalable,":[129],"topology":[130],"independent,":[131],"intrusion-tolerant.":[133]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1589995616","counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-03-23T03:22:39.025823","created_date":"2016-06-24"}