منابع مشابه
A New Security Architecture for TCP/IP Protocol Suite
With the rapid growth and usage of Internet, network security becomes a major issue in the field of research. TCP and IP are the two protocols, which is basis for today’s Internet. IPv4 is the Internet protocol that is replaced with IPv6, which comes with the build mechanism called IPsec for security. But it lacks security in the application layer of TCP/IP Protocol suite. So there is a need fo...
متن کاملSuite B Profile for Internet Protocol Security (IPsec)
The United States Government has published guidelines for "NSA Suite B Cryptography" dated July, 2005, which defines cryptographic algorithm policy for national security applications. This document specifies the conventions for using Suite B cryptography in IP Security (IPsec). Since many of the Suite B algorithms are used in other environments, the majority of the conventions needed for the Su...
متن کاملVerification of A Security Adaptive Protocol Suite Using SPIN
communication technologies in recent years introduced various adaptive protocols to adapt the need for secured communications. Security is a crucial success factor for any communication protocols, especially in mobile environment due to its ad hoc behavior. Formal verification plays an important role in development and application of safety critical systems. Formalized exhausted verification te...
متن کاملAn Abstract Model for Security Protocol Analysis
Security protocol analysis techniques are today mature enough to verify multiple properties of security protocols (correctness, secrecy, authentication). However, because security protocols are growing each day and more complex situations arise (like multi-protocol environments), we consider that the analysis process should be simplified by creating an abstract model for security protocols that...
متن کاملIBM Security zSecure suite
●● ● ●Automate routine administrative tasks to help reduce costs, improve productivity and enforce policy Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. Mistakes such as unintentional configuration errors an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Advances in Information Technology
سال: 2011
ISSN: 1798-2340
DOI: 10.4304/jait.2.2.87-91