Deriving IPSec Network Security Policies from Organization Security Policies
ثبت نشده
چکیده
This paper presents a new model for describing IPSec policies that can be derived by using classifications assigned to information flows. The classifications assigned to information flows are assigned in accordance with NIST information security guidelines.
منابع مشابه
Deriving IPSec Network Security Policies from Organization Security Policies
This paper presents a new model for describing IPSec policies that can be derived by using classifications assigned to information flows. The classifications assigned to information flows are assigned in accordance with NIST information security guidelines.
متن کاملIPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution1
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inefficient and error-prone. An erroneous policy could lead to communication blockade or serious security breach. In addition, even if policies are specified correctly in each domain, the diversified regional security pol...
متن کاملIPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inefficient and error-prone. An erroneous policy could lead to communication blockade or serious security breach. In addition, even if policies are specified correctly in each domain, the diversified regional security pol...
متن کاملA New Method for Creating Efficient Security Policies in Virtual Private Network
One of the most important protocols for implementing tunnels in order to take action of secure virtual private network is IPsec protocol. IPsec policies are used widely in order to limit access to information in security gateways or firewalls. The security treatment, namely (Deny, Allow or Encrypt) is done for outbound as well as inbound traffic by security policies. It is so important that the...
متن کاملIPsec/VPN security policy correctness and assurance
With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN policies are usually specified manually by system administrators and thus prone to errors. However, dynamic aspects in the network may interfere with the existing policy set up and thus cause unexpected conflict. To deal wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006