Using secure coprocessors to protect access to enterprise networks

1Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Enterprise firewalls can be easily circumvented, e.g. by attack agents aboard infected mobile computers or telecommuters' computers, or by attackers exploiting rogue access points or modems. Techniques that prevent connection to enterprise networks of nodes whose configuration does not conform to enterprise policies could greatly reduce such vulnerabilities. Network Admission Control (NAG) and Network Access Protection (NAP) are recent industrial initiatives to achieve such policy enforcement. However, as currently specified, NAC and NAP assume that users are not malicious. We propose novel techniques using secure coprocessors to protect access to enterprise networks. Experiments demonstrate that the proposed techniques are effective against malicious users and have acceptable overhead. © IFIP International Federation for Information Processing 2005.

Cite

CITATION STYLE

APA

Xia, H., Kanchana, J., & Brustoloni, J. C. (2005). Using secure coprocessors to protect access to enterprise networks. In Lecture Notes in Computer Science (Vol. 3462, pp. 154–165). Springer Verlag. https://doi.org/10.1007/11422778_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free