Security Mechanisms in High-Level Network Protocols
نویسندگان
چکیده
منابع مشابه
Comparison of Network-Level Security Protocols
In late 1992, the Internet Engineering Task Force chartered an Internet Protocol Security Protocol Working Group (IPSEC) to “... develop mechanisms to protect client protocols of IP” [10]. The objective was to provide “... authentication, integrity, access control, and confidentiality” at the network layer. In the ~18 months since then, several schemes have been proposed to address this objecti...
متن کاملPerformance Improvements on the Network Level Security Protocols
In a subscription-based remote service, a user is charged a flat fee for a period of time independent of the actual number of times the service is requested. The main concern of the service manager is to make sure that only customers that have paid the fee for the current period are granted access to the service. To do this, the service manager might give each user a username and a password to ...
متن کاملParallelized Network Security Protocols
Security and privacy are growing concerns in the Internet community, due to the Internet’s rapid growth and the desire to conduct business over it safely. This desire has led to the advent of several proposals for security standards, such as secure IP, secure HTTP, and the Secure Socket Layer. All of these standards propose using cryptographic protocols such as DES and RSA. Thus, the need to us...
متن کاملMicrosoft .NET and Security Provided by High-Level Internet Protocols
This paper describes a class of insecure .NET client applications, which avoid higher layer protocol protection through using a “raw” send and receive API. The .NET Framework rests on many other Microsoft components, including the Windows Driver Model (WDM). This model supports four driver types, two of which were considered in this paper: protocol and miniport drivers. By compiling and executi...
متن کاملAccelerating application-level security protocols
We present a minimal extension to the BSD socket layer that can improve the performance of application-level security protocols, such as SSH or SSL/TLS, by 10%, when hardware cryptographic accelerators are available in the system. Applications specify what cryptographic transforms must be applied to incoming and outgoing data frames, and such processing is applied by the operating system itself...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Computing Surveys
سال: 1983
ISSN: 0360-0300,1557-7341
DOI: 10.1145/356909.356913