Security policy deployment in IPsec

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security policy system defines the basic rules and strategies for information security systems, e.g., IPsec, IKE, and Firewalls. But due to the heterogeneous network security systems and the corresponding applications of security policy system, it is difficult to build up a unified policy database and deploy it efficiently. In this paper, we propose a unified security policy database schema to be applied to IPsec system and a synchronous methodology of security policy deployment with controlling network schedule. By these, we can guarantee more efficient security services in the policy-based distributed network.

Cite

CITATION STYLE

APA

Kim, G. W., Park, S. H., Nah, J. H., & Sohn, S. W. (2002). Security policy deployment in IPsec. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2344, pp. 453–464). Springer Verlag. https://doi.org/10.1007/3-540-45801-8_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free