Does your (or anyone elses) gear claim to be a host implementation of the
concept outlined in this paper? 

AF>> Our products are the beginning of such an implementation, which
includes host based firewalls+intrusion detection
for servers and clients and central administration. More work is needed in
authentication and "user seductive" abstraction layers for managing it all,
as well as 
encryption accelerators. Others focusing on host firewalls are going in a
similar direction.

> -----Original Message-----
> From: Fogel, Avi [mailto:[EMAIL PROTECTED]]
> Sent: Friday, 19 May 2000 7:24 AM
> To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
> Subject: RE: Security in Distributed Systems
> 
> 
> Very good writeup in 
> 
> http://www.research.att.com/~smb/papers/distfw.html
> 
> Avi
> 

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to