Building Security-Aware Applications on Celestial Network Security Management Infrastructure

نویسندگان

  • Chong Xu
  • Fengmin Gong
  • Ilia Baldine
  • Liang Han
  • Xinzhou Qin
چکیده

Heterogeneous and distributed nature of the Internet makes it very diicult to customize security protocols and policies in order to satisfy the security needs of applications. Celestial network security management project addresses this issue through building an infrastructure that can dynamically set up inter-domain secure communication channels upon the requests of applications. Celestial System conng-ures security mechanisms across protocol layers and across domains, based on the application's security requirement, security capabilities along the communication path and the security policies of diierent domains. This paper brieey describes the Celestial infrastructure and demonstrates how to build security-aware applications using Celestial network security management infrastructure. We do so by describing how two public domain Internet applications are made secure based on our prototype system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building General Purpose Security Services on Trusted Computing

The Generic Authentication Architecture (GAA) is a standardised extension to the mobile telephony security infrastructures (including the Universal Mobile Telecommunications System (UMTS) authentication infrastructure) that supports the provision of generic security services to network applications. In this paper we propose one possible means for extending the widespread Trusted Computing secur...

متن کامل

Situation - Aware Security for Wireless Ad Hoc Networks

Newly emerging ad hoc networking technology has enormous potential benefit for many missioncritical applications. However, providing adequate security required for the target applications presents many new challenges due to the unique nature of ad hoc environments. Complete decentralization and the absence of any support infrastructure in ad hoc environments effectively eliminates the possibili...

متن کامل

Building General-Purpose Security Services on EMV Payment Cards

The Generic Authentication Architecture (GAA) is a standardised extension to the mobile telephony security infrastructures that supports the provision of security services to network applications. We have proposed a generalised version of GAA which enables almost any pre-existing infrastructure to be used as the basis for the provision of generic security services, and have examined a GAA insta...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000