A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Protection of LAN-wide, P2P interactions: a holistic approach
2009
International Journal of Communication Networks and Distributed Systems
This article advocates the need of a holistic approach to protect LAN interactions and presents a solution for implementing it based on secure LAN (SLAN), a novel security architecture. ...
We show how PPPoE and IPSec security associations may be instantiated and present a prototype implementation for IPSec. . His research interests include security in distributed systems. ...
A prototype implementation was developed for Linux systems. ...
doi:10.1504/ijcnds.2009.027602
fatcat:knetznrnzjbgzmmrj6wsbicys4
ISP Offload Infrastructure to minimize cost and time deployment
2012
2012 IEEE Global Communications Conference (GLOBECOM)
Currently I-WLAN is the proposed offload architecture by 3GPP which tunnels the traffic to a Security Gateway. ...
This paper proposes for ISPs an ISP Offload Infrastructure which minimizes the infrastructure cost deployment, and which can be deployed in a very short term. ...
The remaining traffic that needs to be protected but that cannot be protected via End-to-End security is tunneled to a Security Gateway with the Offload Access Architecture OAA -cf. figure 1. ...
doi:10.1109/glocom.2012.6503250
dblp:conf/globecom/MigaultPHYGAL12
fatcat:ud5hpk45cbanritesnbgd4kbfa
Dynamic Isolation of Network Devices Using OpenFlow for Keeping LAN Secure from Intra-LAN Attack
2013
Procedia Computer Science
In this paper, a novel network system architecture is proposed to protect network devices from intra-LAN attacks by dynamically isolating infected devices with OpenFlow. ...
Preliminary evaluation results demonstrate that the architecture is effective in actual LAN environments. ...
Acknowledgment The authors would like to thank reviewers for their valuable comments. This work was partly supported by JSPS KAKENHI Grant Number (24300039). ...
doi:10.1016/j.procs.2013.09.163
fatcat:w4pavmima5blxiaudcw3kq743m
LAN security: problems and solutions for Ethernet networks
2000
Computer Standards & Interfaces
a prospective solution for building of secure encrypted Ethernet LANs. ...
The architecture presented allows for employment of the existing office network infrastructure, does not require changes to workstations' software, and provides high level of protection. ...
In this paper, we analysed the current situation with and existing architectures for LAN security and discussed why many traditional methods for protecting data in transfer, such as network or application ...
doi:10.1016/s0920-5489(00)00047-7
fatcat:qnanbn6qgzhunkhka3pricuzzu
The CRUTIAL Architecture for Critical Information Infrastructures
[chapter]
2008
Lecture Notes in Computer Science
The architecture we propose is generic and may come to be useful as a reference for modern critical information infrastructures. ...
The chapter concludes with a discussion on Access Control for Critical Information Infrastructures, in Section 5. Architecture Description The CRUTIAL architecture encompasses four aspects. ...
We warmly thank our partners at the project for many discussions on the topics of the chapter. ...
doi:10.1007/978-3-540-85571-2_1
fatcat:zym7eqqe4zb2fnm3vbrkeiaq5i
networks, providing new capabilities for composing secure, distributed multilevel secure solutions. ...
This results in an architecture that meets two compelling requirements: first, that users have a familiar work environment, and, second, that critical mandatory security policies are enforced. ...
For exam-
Figure 1: Monterey Security Architecture ple, an attempt could be made to use a non-TCBE equipped workstation attached to the LAN to modify or collect communications traffic. ...
doi:10.1145/1655108.1655115
dblp:conf/ccs/IrvineNSLKPCG09
fatcat:t7mnl7ltlbdrtdedcxlbepvhmy
Twelfth National Computer Security Conference - Baltimore, MD - October 10-13, 1989
1990
Journal of Research of the National Institute of Standards and Technology
Kirk Barker, Datotek, and Kimberly Kirkpatrick, MITRE, next described the Standard for Interoperable LAN Security (SILS) model which would provide a standard protocol for protecting LAN traffic; the IEEE ...
for the Honeywell LOCK project; the formal specification of security aspects of a messaging system architecture; a Secure Distributed Operating System (SDOS) proto-type; a high B level security architecture ...
doi:10.6028/jres.095.023
pmid:28179774
pmcid:PMC4930047
fatcat:2nvckbuabrg2phfmx6s7lh6ezu
A Multi-agents System for Network Security Management
[chapter]
2000
Telecommunication Network Intelligence
In this context, we propose a new approach for security management using intelligent agent (lA) technology. ...
This approach provides a flexible integration of multiagent technique in a classical network to enhance its protection level against inherent attacks. ...
So, applying security management is a two-fold activity: 1) the security architecture is to be deployed to protect networks by detecting attacks; and 2) when attacks are detected the security architecture ...
doi:10.1007/978-0-387-35522-1_23
dblp:conf/smartnet/BoudaoudG00
fatcat:3o7dpsawjvdrdmj2uvabtxtw24
Architecture for Real Time Monitoring and Modeling of Network Behavior for Enhanced Security
2013
International Journal of Computer Applications
Network security is a rapidly growing and is the major area of concern for every network. ...
An IDS is a system where the events occurring in a network is monitored and analyzed for identifying the sign of possible incidents. ...
Hence a separate security infrastructure is necessary for protecting the mobile agent. ...
doi:10.5120/10655-5421
fatcat:poswoycxv5ctraxedzxo6qv2dm
A Methodology for Network Security Infrastructure according to the New Brazilian General Law for Personal Data Protection
2021
International Journal of Computer Applications
Due to the lack of a reference methodology for implementing the protection requirements defined in the Law, this work proposes one that provides a basis for constructing the network architecture supported ...
by the most common models and applying a security policy to computer network infrastructures. ...
The DAM methodology provides a roadmap for data protection under the law. ...
doi:10.5120/ijca2021921520
fatcat:crhl4tep6ffizgck5ydbmr3nde
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture
[chapter]
2006
Lecture Notes in Computer Science
The paper focuses on the computer systems behind electrical utility infrastructures, and proposes the blueprint of a distributed systems architecture that we believe may come to be useful as a reference ...
for modern critical information infrastructures in general. ...
Acknowledgements CRUTIAL is a project of the IST programme of the European ...
doi:10.1007/11962977_1
fatcat:icn65da2qjhhbpujn5ekj4irti
The CRUTIAL reference critical information infrastructure architecture: a blueprint
2008
International Journal of System of Systems Engineering
It proposes the blueprint of a distributed systems architecture that we believe may come to be useful as a reference for modern CII in general. ...
., Neves, N.F. and Correia, M. (2008) 'The CRUTIAL reference critical information infrastructure architecture: a blueprint', Int. ...
Acknowledgements CRUTIAL is a project of the IST programme of the European Commission. ...
doi:10.1504/ijsse.2008.018132
fatcat:74mwshex5nhhpp5sloqoyo2wii
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
2005
Fourth IEEE International Symposium on Network Computing and Applications
This paper focuses on the networking aspects of the DPASA 1 survivability architecture, which was used recently to defense-enable a DoD information system. ...
Experience shows that implementing absolute security or preventing cyber attacks completely is infeasible when systems must be highly interconnected and comprise of COTS components with unknown security ...
F30602-02-C-0134. 1 DPASA stands for Designing Protection and Adaptation into a Survivability Architecture. architecture introduces multiple mechanisms (representing both COTS and research grade technologies ...
doi:10.1109/nca.2005.35
dblp:conf/nca/AtighetchiRPCS05
fatcat:pfo6n3snrzh3vfsem5ok67v22a
A computational asset vulnerability model for the strategic protection of the critical infrastructure
2014
International Journal of Critical Infrastructure Protection
courseware on modern OS Security for CMU Software Engineering Institute, through a $19,349 grant from JMark Services, 2/13-5/24/2013. ...
The system provides a graphical interface to facilitate the application of these methods and creates an interactive environment for specifying, verifying and designing communication protocols. ...
doi:10.1016/j.ijcip.2014.06.002
fatcat:wupejmictrfthp22jzeknitwxu
Secure Client Puzzles Based on Random Beacons
[chapter]
2012
Lecture Notes in Computer Science
In this paper we introduce a secure client puzzle architecture that overcomes the described authentication issue. ...
A well-known countermeasure against resource depletion attacks are client puzzles. Most existing client puzzle schemes are interactive. ...
Protocol Extensions
Beacon Distribution across LAN Boundaries Our secure client puzzle architecture primarily focuses on LANs where counterattacks on interactive client puzzle protocols through injection ...
doi:10.1007/978-3-642-30054-7_15
fatcat:uh3ypnbx5ncy3e4qmnwhz3e4x4
« Previous
Showing results 1 — 15 out of 10,743 results