A security scheme for protecting security policies in firewall

被引:0
|
作者
Lee, Jung-Seuk [1 ]
Jeon, Jun-Cheol [1 ]
Yoo, Kee-Young [1 ]
机构
[1] Department of Computer Engineering, Kyungpook National University
来源
Operating Systems Review (ACM) | 2004年 / 38卷 / 02期
关键词
Algorithms - Computer system firewalls - Cryptography - Mobile computing;
D O I
10.1145/991130.991136
中图分类号
学科分类号
摘要
This paper discusses the problem of protecting security policies and other related information in security mechanism, such as the filtering policy of a firewall in distributed or ubiquitous environment. Unauthorized disclosure of such information might reveal the fundamental principles and methods for the protection of the whole network. We discuss the problem with typical protecting method using hash functions and we propose a scheme that protects the rule in firewall using cryptographic algorithm.
引用
收藏
页码:69 / 72
相关论文
共 50 条
  • [1] Localizing Firewall Security Policies
    Adao, Pedro
    Focardi, Riccardo
    Guttman, Joshua D.
    Luccio, Flaminia L.
    2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 194 - 209
  • [2] Firewall security: Policies, testing and performance evaluation
    Lyu, MR
    Lau, LKY
    24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 116 - 121
  • [3] An Automated Validation Method for Security Policies: the firewall case
    Abassi, Ryma
    El Fatmi, Sihem Guemara
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 291 - 294
  • [4] Towards an Automated Firewall Security Policies Validation Process
    Abassi, Ryma
    El Fatmi, Sihem Guemara
    CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 267 - 272
  • [5] Automatic Verification of Conformance of Firewall Configurations to Security Policies
    Ben Youssef, Nihel
    Bouhoula, Adel
    Jacquemard, Florent
    ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 525 - +
  • [6] A formal basis for the design and analysis of firewall security policies
    Khoumsi, Ahmed
    Erradi, Mohammed
    Krombi, Wadie
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2018, 30 (01) : 51 - 66
  • [7] Multi-constraint Security Policies for Delegated Firewall Administration
    Kropiwiec, CAssio Ditzel
    Jamhour, Edgard
    Penna, Manoel C.
    Pujolle, Guy
    MANAGING LARGE-SCALE SERVICE DEPLOYMENT, PROCEEDINGS, 2008, 5273 : 123 - +
  • [8] Multi-constraint security policies for delegated firewall administration
    Kropiwiec, Cassio Ditzel
    Jamhour, Edgard
    Penna, Manoel Camillo
    Pujolle, Guy
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2011, 21 (06) : 469 - 493
  • [9] Design and implementation of firewall security policies using Linux iptables
    Mihalos M.G.
    Nalmpantis S.I.
    Ovaliadis K.
    Journal of Engineering Science and Technology Review, 2019, 12 (01): : 80 - 86
  • [10] Directed Acyclic Graph Modeling of Security Policies for Firewall Testing
    Tuglular, T.
    Kaya, Oe.
    Muftuoglu, C. A.
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 393 - 398