Independent policy oriented layering of security services

被引:0
作者
Leitold, H [1 ]
Lipp, P [1 ]
Sterbenz, A [1 ]
机构
[1] Graz Univ Technol, IAIK, A-8010 Graz, Austria
来源
INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES | 2000年 / 47卷
关键词
security; policy; S/Mime; SSL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Implementing a security policy has to cope with the diversity of communication requirements and applications. We present a policy oriented approach from the observation of common problems and characteristics given in networked applications. The solution reduces the trust required into the security system to a single entity. This is done in an application independent manner by fooling the applications and feigning a conventional insecure networking environment that is further transformed to a secure communication infrastructure.
引用
收藏
页码:89 / 98
页数:4
相关论文
共 13 条
[1]  
Deering S., 1998, INTERNET PROTOCOL VE
[2]  
DUSSE S, 1998, 2311 RFC
[3]  
Freier AlanO., 1996, The SSL protocol version 3.0
[4]  
*IAIK, 1999, JCE2 5 JAV CRYPT EXT
[5]  
LEECH M, 1996, 1928 RFC
[6]  
*MSDN, 1999, INTR ACT SERV PAG
[7]  
MYERS J, 1996, 1933 RFC
[8]  
*NETSC CORP, 1998, CLIENT SID JAV SPEC
[9]  
OAKES C, WIRED NEWS
[10]  
Postel Jonathan B., 1982, 821 RFC