{"id":"https://openalex.org/W2142116747","doi":"https://doi.org/10.1109/pccc.2008.4745136","title":"A Highly Available Transparent Linux Cluster Security Model","display_name":"A Highly Available Transparent Linux Cluster Security Model","publication_year":2008,"publication_date":"2008-12-01","ids":{"openalex":"https://openalex.org/W2142116747","doi":"https://doi.org/10.1109/pccc.2008.4745136","mag":"2142116747"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2008.4745136","pdf_url":null,"source":{"id":"https://openalex.org/S4210175320","display_name":"IEEE International Performance, Computing, and Communications Conference","issn_l":"1097-2641","issn":["1097-2641","2374-9628"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091091646","display_name":"Visham Ramsurrun","orcid":null},"institutions":[{"id":"https://openalex.org/I69072986","display_name":"University of Mauritius","ror":"https://ror.org/05cyprz33","country_code":"MU","type":"funder","lineage":["https://openalex.org/I69072986"]}],"countries":["MU"],"is_corresponding":false,"raw_author_name":"V. Ramsurrun","raw_affiliation_strings":["Electr. & Electron. Eng. Dept., Univ. of Mauritius, Reduit"],"affiliations":[{"raw_affiliation_string":"Electr. & Electron. Eng. Dept., Univ. of Mauritius, Reduit","institution_ids":["https://openalex.org/I69072986"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112458654","display_name":"K. M. S. Soyjaudah","orcid":null},"institutions":[{"id":"https://openalex.org/I69072986","display_name":"University of Mauritius","ror":"https://ror.org/05cyprz33","country_code":"MU","type":"funder","lineage":["https://openalex.org/I69072986"]}],"countries":["MU"],"is_corresponding":false,"raw_author_name":"K.M.S. Soyjaudah","raw_affiliation_strings":["Electr. & Electron. Eng. Dept., Univ. of Mauritius, Reduit"],"affiliations":[{"raw_affiliation_string":"Electr. & Electron. Eng. Dept., Univ. of Mauritius, Reduit","institution_ids":["https://openalex.org/I69072986"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.542368,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":74,"max":76},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.69271344},{"id":"https://openalex.org/keywords/context-based-access-control","display_name":"Context-based access control","score":0.5120254},{"id":"https://openalex.org/keywords/high-availability","display_name":"High availability","score":0.45439604},{"id":"https://openalex.org/keywords/tamper-resistance","display_name":"Tamper resistance","score":0.42983368}],"concepts":[{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.86908174},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81006193},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.7241879},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.69271344},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.59439653},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5689943},{"id":"https://openalex.org/C42934231","wikidata":"https://www.wikidata.org/wiki/Q1128692","display_name":"Context-based access control","level":5,"score":0.5120254},{"id":"https://openalex.org/C138959212","wikidata":"https://www.wikidata.org/wiki/Q1806783","display_name":"Load balancing (electrical power)","level":3,"score":0.49453923},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.45741743},{"id":"https://openalex.org/C65813073","wikidata":"https://www.wikidata.org/wiki/Q1622420","display_name":"High availability","level":2,"score":0.45439604},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.44272026},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.43485898},{"id":"https://openalex.org/C19163912","wikidata":"https://www.wikidata.org/wiki/Q7681779","display_name":"Tamper resistance","level":2,"score":0.42983368},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4176507},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3451303},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2008.4745136","pdf_url":null,"source":{"id":"https://openalex.org/S4210175320","display_name":"IEEE International Performance, Computing, and Communications Conference","issn_l":"1097-2641","issn":["1097-2641","2374-9628"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":7,"referenced_works":["https://openalex.org/W1867219652","https://openalex.org/W2103198962","https://openalex.org/W2148974720","https://openalex.org/W2154341308","https://openalex.org/W2158673492","https://openalex.org/W569942054","https://openalex.org/W627690729"],"related_works":["https://openalex.org/W2391388260","https://openalex.org/W2390883130","https://openalex.org/W2383152090","https://openalex.org/W2372629054","https://openalex.org/W2371002765","https://openalex.org/W2370002234","https://openalex.org/W2369691585","https://openalex.org/W2349986472","https://openalex.org/W2142116747","https://openalex.org/W1599851322"],"abstract_inverted_index":{"The":[0],"use":[1,26],"of":[2,17,27,40,73,77],"firewall":[3,64],"load":[4,31,65],"balancing":[5,66],"(FWLB)":[6],"in":[7],"tandem":[8],"with":[9],"transparent":[10,43,52],"firewalls":[11,20],"is":[12,68],"problematic":[13],"as":[14],"the":[15,25,36,71],"benefits":[16],"using":[18],"stealth":[19],"are":[21],"nullified":[22],"due":[23],"to":[24],"IP":[28],"addressing":[29],"on":[30],"balancers.":[32],"This":[33,79],"paper":[34],"describes":[35],"design":[37],"&":[38,92],"implementation":[39],"a":[41,58],"new":[42],"cluster":[44],"security":[45,80],"model":[46],"that":[47],"addresses":[48],"this":[49],"problem.":[50],"A":[51],"stateful":[53],"CSG":[54],"architecture,":[55],"which":[56],"uses":[57],"distributed":[59],"sender-initiated":[60],"Layer":[61],"2":[62],"per-packet":[63],"scheme,":[67],"devised":[69],"for":[70],"protection":[72],"switched":[74],"Linux":[75],"clusters":[76],"computers.":[78],"architecture":[81],"presents":[82],"several":[83],"advantages":[84],"like":[85],"transparency,":[86],"robust":[87],"security,":[88],"high":[89],"availability,":[90],"scalability":[91],"reliability,":[93],"tamper":[94],"resistance,":[95],"anti-spoofing":[96],"and":[97],"anti-sniffing.":[98]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2142116747","counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-04-19T00:12:53.664144","created_date":"2016-06-24"}