Delegating network security with more information

20Citations
Citations of this article
62Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be able to cope, the administrator needs to delegate some control back to end-hosts and users, a capability that is missing in today's networks. Delegation makes administrators less of a bottleneck when policy needs to be modified and allows network administration to follow organizational lines. To enable delegation, we propose ident++ - a simple protocol to request additional information from end-hosts and networks on the path of a flow. ident++ allows users and end-hosts to participate in network security enforcement by providing information that the administrator might not have or rules to be enforced on their behalf. In this paper we describe ident++ and how it provides delegation and enables flexible and powerful policies. Copyright 2009 ACM.

Cite

CITATION STYLE

APA

Naous, J., Stutsman, R., Mazières, D., McKeown, N., & Zeldovich, N. (2009). Delegating network security with more information. In Computer Communication Review (pp. 19–26). Association for Computing Machinery (ACM). https://doi.org/10.1145/1592681.1592685

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free