Software-defined security controller-based end-to-end packet key security management

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

End-to-End Network Security

Traditionally, the kernel has provided extremely limited protection of network communications. This is especially nettlesome since network connections are the conduits through which the computer systems are most vulnerable. IPSec is now widely available to protect network connections, encrypting network communications in the kernel. But cryptography alone is insufficient to implement end-to-end...

متن کامل

End-to-end Security in Wireless Lans

Solution A Trapeze Networks Smart Mobile wireless LAN integrated with Juniper Networks IC Series Unified Access Control Appliances, UAC agents, and UAC Enforcement Points deliver a comprehensive identity-based, end-to-end secure wireless network. Companies can maintain the security and integrity of their entire network by using Juniper Networks SBR Series Steel-Belted Radius Servers to provide ...

متن کامل

End-to-End Security for Personal Telehealth

Personal telehealth is in rapid development with innovative emerging applications like disease management. With personal telehealth people participate in their own care supported by an open distributed system with health services. This poses new end-to-end security and privacy challenges. In this paper we introduce new end-to-end security requirements and present a design for consent management...

متن کامل

End-to-End Security for Enterprise Mashups

Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterprise environments, mashups are recently used for implementing Web-based business processes, however, security is a major concern. Current approaches do not allow the mashup to securely consume services with diverse security require...

متن کامل

End-to-End Web Application Security

Web applications are important, ubiquitous distributed systems whose current security relies primarily on server-side mechanisms. This paper makes the end-toend argument that the client and server must collaborate to achieve security goals, to eliminate common security exploits, and to secure the emerging class of rich, crossdomain Web applications referred to as Web 2.0. In order to support en...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2019

ISSN: 1877-0509

DOI: 10.1016/j.procs.2019.08.016