Software-defined security controller-based end-to-end packet key security management
نویسندگان
چکیده
منابع مشابه
End-to-End Network Security
Traditionally, the kernel has provided extremely limited protection of network communications. This is especially nettlesome since network connections are the conduits through which the computer systems are most vulnerable. IPSec is now widely available to protect network connections, encrypting network communications in the kernel. But cryptography alone is insufficient to implement end-to-end...
متن کاملEnd-to-end Security in Wireless Lans
Solution A Trapeze Networks Smart Mobile wireless LAN integrated with Juniper Networks IC Series Unified Access Control Appliances, UAC agents, and UAC Enforcement Points deliver a comprehensive identity-based, end-to-end secure wireless network. Companies can maintain the security and integrity of their entire network by using Juniper Networks SBR Series Steel-Belted Radius Servers to provide ...
متن کاملEnd-to-End Security for Personal Telehealth
Personal telehealth is in rapid development with innovative emerging applications like disease management. With personal telehealth people participate in their own care supported by an open distributed system with health services. This poses new end-to-end security and privacy challenges. In this paper we introduce new end-to-end security requirements and present a design for consent management...
متن کاملEnd-to-End Security for Enterprise Mashups
Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterprise environments, mashups are recently used for implementing Web-based business processes, however, security is a major concern. Current approaches do not allow the mashup to securely consume services with diverse security require...
متن کاملEnd-to-End Web Application Security
Web applications are important, ubiquitous distributed systems whose current security relies primarily on server-side mechanisms. This paper makes the end-toend argument that the client and server must collaborate to achieve security goals, to eliminate common security exploits, and to secure the emerging class of rich, crossdomain Web applications referred to as Web 2.0. In order to support en...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2019
ISSN: 1877-0509
DOI: 10.1016/j.procs.2019.08.016