scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2006"


Journal ArticleDOI
TL;DR: Using event history analysis, the authors found that CEOs and CFOs of firms filing a material financial restatement were more than twice as likely to exit their firms as their counterparts in a matched samp...
Abstract: Using event history analysis, we found that CEOs and CFOs of firms filing a material financial restatement were more than twice as likely to exit their firms as their counterparts in a matched samp...

483 citations


Journal ArticleDOI
TL;DR: In this paper, the authors show that the answer is yes to both questions, but managers must do more to reap long-term gains by formalizing relationships, and they provide important insights as to how this can be accomplished.

247 citations


Patent
09 Feb 2006
TL;DR: In this paper, the hand guard is attached to the receiver by an attachment that stably holds the removable hand guard from the receiver to the barrel, and the attachment is arranged for allowing detachment and removal of the hand guards from the firearm without removal of fasteners.
Abstract: A rifle having a receiver with an integral hand guard and a barrel. The barrel is connected to the receiver. The hand guard extends over and surrounds the barrel. A removable hand guard is attached to the receiver by an attachment that stably holds the removable hand guard to the receiver. The attachment is arranged for allowing detachment and removal of the removable hand guard from the receiver without removal of fasteners.

151 citations


Patent
29 Dec 2006
TL;DR: In this article, a secure connection between a client device and a first security gateway is established, and the first gateway is associated with a service provider for providing a service to the client device.
Abstract: A method includes establishing a secure connection between a client device and a first security gateway, the first security gateway being associated with a service provider for providing a service to the client device, and handing off the secure connection from the first security gateway to a second security gateway. Handing off the secure connection includes sending from the first security gateway to the second security gateway security information used to encrypt and decrypt messages transmitted through the secure connection, and sending from the first security gateway to the client device an address of the second security gateway to enable the client device to initiate contact with the second security gateway.

95 citations


Patent
28 Apr 2006
TL;DR: In this paper, a transport guard within a memory partition logically partitions a protected application running in the partition and a networking stack, and defines ports for the transport guard including (i) an application port for forwarding data to and receiving data from the application, (ii) a data port for receiving data addressed to the application from the networking stack and (iii) a control port for supplying configuration data to the Transport Guard.
Abstract: A method of enforcing a network security policy including mandatory access control (MAC), discretionary access control (DAC) and integrity control for a secure information network, includes operating a transport guard within a memory partition logically between a protected application running in the partition and a networking stack, and defining ports for the transport guard including (i) an application port for forwarding data to and receiving data from the application, (ii) a data port for receiving data addressed to the application from the networking stack, and for sending data originating from the application to the stack, and (iii) a control port for supplying configuration data to the transport guard. The configuration data corresponds to MAC, DAC and integrity control policies specified by the network for the protected application. The transport guard limits data flow between its protected application and the data ports accordingly.

86 citations


Journal ArticleDOI
TL;DR: Two generations of novel firewall analysis tools are designed and implemented, which allow the administrator to easily discover and test the global firewall policy, and they operate on a more understandable level of abstraction.
Abstract: Practically every corporation that is connected to the Internet has at least one firewall, and often many more. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. Therefore, testing, auditing, or reverse-engineering existing firewall configurations are important components of every corporation’s network security practice. Unfortunately, this is easier said than done. Firewall configuration files are written in notoriously hard to read languages, using vendor-specific GUIs. A tool that is sorely missing in the arsenal of firewall administrators and auditors is one that allows them to analyze the policy on a firewall.To alleviate some of these difficulties, we designed and implemented two generations of novel firewall analysis tools, which allow the administrator to easily discover and test the global firewall policy. Our tools use a minimal description of the network topology, and directly parse the various vendor-specific low-level configuration files. A key feature of our tools is that they are passive: no packets are sent, and the analysis is performed offline, on a machine that is separate from the firewall itself. A typical question our tools can answer is “from which machines can our DMZ be reached, and with which services?.” Thus, our tools complement existing vulnerability analyzers and port scanners, as they can be used before a policy is actually deployed, and they operate on a more understandable level of abstraction. This paper describes the design and architecture of these tools, their evolution from a research prototype to a commercial product, and the lessons we have learned along the way.

75 citations


Patent
12 Jun 2006
TL;DR: In this paper, a spanning tree protocol engine, in one embodiment, implements the Rapid Spanning Tree Protocol (RSTP) to transition the ports among a plurality of port states, including a discarding state, a learning state and a forwarding state.
Abstract: A system and method are provided to prevent the formation of loops in a network. The network device includes a plurality of ports for receiving and forwarding network messages and a spanning tree protocol engine. The spanning tree protocol engine, in one embodiment, implements the Rapid Spanning Tree Protocol (RSTP) to transitions the ports among a plurality port states, including a discarding state, a learning state and a forwarding state. The network device further includes a loop guard engine that is in a communicating relationship with the spanning tree protocol engine and the ports. The loop guard engine monitors the receipt of bridge protocol data units (BPDUs) by the ports. If a given port stops receiving BPDUs, the loop guard engine prevents the spanning tree protocol engine from transitioning the given port to the forwarding state. Instead, the loop guard engine causes the port to transition to loop inconsistent state.

61 citations


Patent
13 Jul 2006
TL;DR: In this paper, a method and system for creating security policies for firewall and connection policies in an integrated manner is provided, where the security system provides a user interface through which a user can define a security rule that specifies both a firewall policy and a connection policy.
Abstract: A method and system for creating security policies for firewall and connection policies in an integrated manner is provided. The security system provides a user interface through which a user can define a security rule that specifies both a firewall policy and a connection policy. After the security rule is specified, the security system automatically generates a firewall rule and a connection rule to implement the security rule. The security system provides the firewall rule to a firewall engine that is responsible for enforcing the firewall rules and provides the connection rule to an IPsec engine that is responsible for enforcing the connection rules.

59 citations


Patent
17 Nov 2006
TL;DR: In this article, a radio transmission apparatus includes a guard interval insertion unit, a waveform shaping unit, and a controller that controls an insertion period of the guard interval by the insertion unit such that the data block is located in a time period exclusive of the time period which is a signal attenuation period.
Abstract: A radio transmission apparatus includes: a guard interval insertion unit that inserts a guard interval in every data block of a transmission data signal; a waveform shaping unit that performs a signal attenuation processing in a time period that includes a boundary of a signal block in which the guard interval has been inserted; and a controller that controls an insertion period of the guard interval by the guard interval insertion unit such that the data block is located in a time period exclusive of the time period which is a signal attenuation period by the waveform shaping unit. By this, in an environment where a signal to which a window function (band limitation) is applied may be received, while the guard intervals are effectively utilized, degradation of reception characteristics due to influence of the band limitation is prevented.

49 citations


Patent
06 Jan 2006
TL;DR: In this article, a modular fore-end rail assembly for mounting onto a firearm includes an upper hand guard, a lower hand guard and a clamping member that combines with the rear portion of the upperhand guard to encircle and clamp onto the barrel nut, thereby supporting the entire assembly from the front of upper receiver and preventing any transfer of load into the barrel.
Abstract: A modular fore-end rail assembly for mounting onto a firearm includes an upper hand guard, a lower hand guard and a clamping member that combines with the rear portion of the upper hand guard to encircle and clamp onto the barrel nut thereby supporting the entire assembly from the front of the upper receiver and preventing any transfer of load into the barrel. The lower portion of the hand guard is slidably received into channels formed in the upper hand guard and is retained in its installed position by a spring biased detent located in the clamping member. The lower hand guard is removable by simply depressing the detent and sliding the lower hand guard forward. By providing for the easy removal of the lower hand guard, other auxiliary devices may be mounted to the upper hand guard.

47 citations


Patent
29 Mar 2006
TL;DR: In this paper, the authors describe techniques for transmitting data in a manner to facilitate equalization at a receiver, where pilot is added to each set of at least one data block.
Abstract: Techniques for transmitting data in a manner to facilitate equalization at a receiver are described. Guard intervals are appended to data blocks such that each data block has a guard interval at the beginning of the data block and a guard interval at the end of the data block. Each guard interval may be discontinuous transmission (DTX), a polyphase sequence, or some other known sequence. Pilot is appended to each set of at least one data block. The data blocks, pilot, and guard intervals may be sent using various slot structures and are processed for transmission. The processing may include mapping the data blocks to at least one physical channel, channelizing the data blocks for each physical channel with a channelization code, combining all physical channels, and scrambling the combined data, pilot, and guard intervals with a scrambling code.

Patent
28 Apr 2006
TL;DR: In this article, the presence server determines, based upon the past communication data (or other prioritization data) of a subscriber, whether to notify about the presentity's state change immediately or to wait on notifying the watcher until either additional notify messages also need to be sent (and can be bundled in one message) or a guard timer expires.
Abstract: A method and apparatus for reducing network resources from presence notification traffic. This invention assumes a standard presence architecture of presentities, watchers, and a presence server involved in pushing (notifying) watchers when a presentity's state changes. In addition, there exists a source of past communication data (or other data providing a means of prioritization) for a subscriber. The presence server determines, based upon the past communication data (or other prioritization data) of a subscriber, whether to notify about the presentity's state change immediately or to wait on notifying the watcher until either additional notify messages also need to be sent (and can be bundled in one message) or a guard timer expires. In this fashion, the presence information that the subscriber cares about is delivered in real time while the information that is less important to the subscriber consumes less network resources.

Patent
08 Jun 2006
TL;DR: In this article, a razor cartridge includes a plurality of skin-engaging elements, including a first inter-blade guard, a cap, and a rinse-through gap between the first and second blades.
Abstract: According to the present invention, a razor cartridge (10) includes a plurality of skin-engaging elements (12) disposed on a frame (14). The skin engaging elements include at least two or more substantially blades (18) having a sharpened cutting edge(32), a first inter-blade guard(20), and a cap (16). The two or more blades are disposed on the frame in parallel relation to one another. The first inter-blade guard is disposed on the frame between two (2) blades. A rinse-through gap (36) extends across substantially the entire length of the frame between the first inter-blade guard and the blade aft the first inter-blade guard.


Journal ArticleDOI
TL;DR: Analytical and simulation results show that proposed fairly adjusted multimode-dynamic guard bandwidth scheme is able to provide performance guarantees in terms of dropping probabilities under nonstationary traffic arrival and imperfect arrival rate estimation.
Abstract: Guard-based call admission control schemes support admission priorities based on resources sharing with differentiated resource capacity limits. To minimize deviation from call blocking/dropping targets due to nonstationary call arrival condition, dynamic guard-based schemes with predictive adaptation control adjust differentiated capacity limits according to predicted future arrival rates based on specified estimation algorithms. Existing dynamic guard admission schemes are developed under the assumption of perfect estimation, which may not be possible in a highly nonstationary environment and, thus resulting in failures to maintain targeted blocking/dropping probabilities. This paper presents the fairly adjusted multimode-dynamic guard bandwidth scheme, which is a dynamic-guard-based scheme over code-division multiple-access systems with predictive adaptation control to adapt interference-based guard loading-limits under nonstationary call arrival condition; and reactive adaptation control to counteract arrival rate estimation errors. When the predictive adaptation control policy mode is not able to maintain long-term call blocking or dropping targets due to estimation error, this will trigger reactive adaptation control policy modes that include temporary blocking (preemption) of one or more lower priority classes subject to fairness constraints to ensure lower priority classes are not preempted at all costs during estimation error recovery. Analytical and simulation results show that proposed scheme is able to provide performance guarantees in terms of dropping probabilities under nonstationary traffic arrival and imperfect arrival rate estimation.

Patent
05 May 2006
TL;DR: In this paper, a guard rail support and assembly is disclosed for use in providing a safe work area for workmen working at dangerous heights, particularly in the construction industry, and a portable and lightweight guard rail assembly may be constructed with the guard rail supports in an expedient and efficient manner to provide safe, unobstructive protection against falls.
Abstract: A guard rail support and assembly is disclosed for use in providing a safe work area for workmen working at dangerous heights, particularly in the construction industry. The guard rail support assembly comprises a plurality of guard rail supports arranged in a spaced fashion and wooden guard rails extending between and attached on either end to each support. Each guard rail support comprises an attachment base having quick fastening means for quick attachment and release of the support to a ground surface of the site under construction, a plurality of rail supports having quick fastening means for quick attachment and release of the wooden guard rails and a fall-protection or tarp tie-off ring. Advantageously, a portable and lightweight guard rail assembly may be constructed with the guard rail supports in an expedient and efficient manner to provide safe, unobstructive protection against falls.

Patent
08 Feb 2006
TL;DR: In this article, the retention guard is pivoted between a closed position for securing a handgun within the cavity and an open position for removal of the handgun, when a user's thumb/finger applies a pivoting force to the engagement portion such that the retention locking portion is sufficiently withdrawn from the guard locking means to allow the guard to pivot to the open position.
Abstract: A holster for a handgun, comprising a holster body defining a cavity for receiving and holding a handgun; a retention guard pivotably coupled to the body, wherein the retention guard is pivotable between a closed position for securing a handgun within the cavity and an open position for removal of the handgun; and a guard release lever for releasably securing the retention guard in the closed position, wherein the guard release lever is biased to a guard retention position, but wherein the guard release lever is capable of being pivoted to a guard release position when a user's thumb/finger applies a pivoting force to the thumb/finger engagement portion such that the guard locking portion is sufficiently withdrawn from the guard locking means to allow the retention guard to pivot to the open position.

Patent
16 May 2006
TL;DR: In this paper, a header with a movably mounted knife and a guard for shielding the moving and rotating components operating the knife is described, the guard preferably comprising two interconnected parts of which the first part is mounted on the header so as not to move with the knife and the second part is coupled for movement with a knife.
Abstract: In a header having a movably mounted knife and a guard for shielding the moving and rotating components operating the knife, the guard preferably comprising two interconnected parts of which the first part is mounted on the header so as not to move with the knife and the second part is coupled for movement with the knife. In this way, the area shielded by the guard automatically expands and contracts with movement of the knife.

Patent
07 Apr 2006
TL;DR: A mixer may include one or more of (i) a readily installable and removable bowl guard member (90), (ii) a bowl guard sensor arrangement (154), (iii) bowl guard support ring assembly (60), including a plastic part and a metal part, and (iv) an adjustable bowl guard membership (60) as discussed by the authors.
Abstract: A mixer (10) may include one or more of (i) a readily installable and removable bowl guard member (90) , (ii) a bowl guard sensor arrangement (154) , (iii) a bowl guard support ring assembly (60) including a plastic part and a metal part, (iv) a bowl guard support ring assembly (60) and bowl guard member (90) that interact for limiting movement of the bowl guard member (90) .

Book
01 Jan 2006
TL;DR: A Bloody Business as mentioned in this paper provides an unprecedented look behind the scenes and into the ranks of this mercenary force who guard supply convoys, train foreign soldiers, provide security for foreign leaders and dignitaries - and whose workplaces are the most dangerous hot spots on the planet.
Abstract: The mysteries of mercenary soldiers have a perennial allure. As the U.S. Army shrinks, a private army steps into the breach. "A Bloody Business" offers an unprecedented look behind the scenes and into the ranks of this mercenary force (numbering as many as 15,000 today) who guard supply convoys, train foreign soldiers, provide security for foreign leaders and dignitaries - and whose workplaces are the most dangerous hot spots on the planet. With its insights into who these men are, what drives them, where they come from, how they prepare, and what they do, this book provides a uniquely close-up and complete picture of the private army behind America's military muscle.

Patent
Manabu Ichikawa1, Takatsugu Kido1
05 Sep 2006

Patent
23 Aug 2006
TL;DR: In this paper, a cable 54 operatively connecting between a seat locking mechanism and a key device adapted to be actuated by a key is used to prevent an access from outside of a vehicle body to the cable.
Abstract: A guard structure for a vehicle seat lock includes a cable 54 operatively connecting between a seat locking mechanism ( 49 ) for a vehicle seat and a key device ( 51 ) adapted to be actuated by a key. The guard structure also includes a guard body ( 81 ) for blocking an access from outside of a vehicle body to the cable ( 54 ).

Book ChapterDOI
05 Jan 2006
TL;DR: An experiment investigated whether a human guard would detect false acceptances made by a computerized system, and the role of hair in human recognition of faces, and showed that the ability of human guard to recognize a human face is a function of hair.
Abstract: Face recognition has greatly matured since the earliest forms, but still improvements must be made before it can be applied in high security or large scale applications We conducted an experiment in order to estimate percentage of Norwegian people having one or more look-alikes in Norwegian population The results indicate that the face recognition technology may not be adequate for identity verification in large scale applications To survey the additional value of a human supervisor, we conducted an experiment where we investigated whether a human guard would detect false acceptances made by a computerized system, and the role of hair in human recognition of faces The study showed that the human guard was able to detect almost 80% of the errors made by the computerized system More over, the study showed that the ability of human guard to recognize a human face is a function of hair: false acceptance rate was significantly higher for the images where the hair was removed compared to where it was present

Patent
28 Apr 2006
TL;DR: A catcher's leg protector is a leg protector with adjustable foot and toe guard that covers a portion of a wearer's foot and ankle as discussed by the authors, and an adjustment mechanism for moving the foot and foot guard relative to the shin guard and locking them in a fixed position.
Abstract: A catcher's leg protector having an adjustable foot and toe guard includes a shin guard for covering a wearer's shin, a foot and toe guard for covering a portion of a wearer's foot, and an adjustment mechanism for moving the foot and toe guard relative to the shin guard and locking the foot and toe guard in a fixed position. Various embodiments of the leg protector and associated method are provided.


Proceedings ArticleDOI
25 May 2006
TL;DR: In this article, the authors present the synthesis of a SCADA (Supervisory Control And Data Acquisition) system, named Pollution Guard, designed to collect and process atmospheric pollution data measured in several strategic points of a region.
Abstract: This paper presents the synthesis of a SCADA (Supervisory Control And Data Acquisition) system, named Pollution Guard, designed to collect and process atmospheric pollution data measured in several strategic points of a region. Pollution Guard makes use of the GPRS (General Packet Radio Service) data communication infrastructure from a mobile communication provider that covers a very large area, practically the air pollution data being collected from every place in the country. In comparison to other similar systems, the new functionalities provided by Pollution Guard are the SMS (Short Messaging System) and e-mail alerts generated when the level of toxic substances exceeds some given values, chosen with regard to respiratory illness.

Patent
19 Dec 2006

Patent
11 Apr 2006
TL;DR: In this article, the guard interval in use by a radio access network of a wireless communication system, such as a one using OFDM, is communicated from the radio access system to a mobile station so that the mobile station need not try different guard intervals to determine which is in use.
Abstract: Method by which the guard interval in use by a radio access network of a wireless communication system, such as a one using OFDM, is communicated from the radio access network to a mobile station so that the mobile station need not try different guard intervals to determine which is in use. The method is based on transmitting system information indicative of the guard interval at a predetermined time relative to a training sequence. Corresponding equipment is also provided.

Patent
20 Jan 2006
TL;DR: In this paper, a shallow V-shaped guard wall extending between a pair of opposing sidewalls of a lower end portion of a coin-operated item vending and game apparatus housing is used to block debris, such as pieces of paper, from traveling on a path to a coin slot.
Abstract: Foreign object removal-enabling features in a coin-operated item vending and game apparatus housing include a shallow V-shaped guard wall extending between a pair of opposing sidewalls of a lower end portion of the housing, a pair of openings each in one of the opposing sidewalls adjacent opposite ends of the guard wall, and another opening in a front wall of the housing below and in front of the guard wall. The guard wall is positioned to block debris, such as pieces of paper, from traveling on a path to a coin slot of a coin deposit while providing a slot in the guard wall for permitting a coin to pass through the guard wall to the coin slot. The wall openings will permit insertion a tweezers or other tool therethrough enable the debris removal.

Journal ArticleDOI
Mark Bowden1
01 Jan 2006
TL;DR: In this article, the idea that these recesses were necessarily of defensive use is challenged and an alternative ritual or symbolic explanation is suggested, which is an attempt to start such a discussion.
Abstract: Recesses in the entrance passages of British hillforts have been found throughout the 20th century, mainly on sites in north Wales and the Welsh Marches, though some occur elsewhere. From their first discovery they have been assumed to be ‘guard rooms’ or ‘guard chambers’ and no discussion about their function has taken place. This paper is, an attempt to start such a discussion. The idea that these recesses were necessarily of defensive use is challenged and an alternative ritual or symbolic ‘explanation’ is suggested.