A security scheme for protecting security policies in firewall

被引:0
|
作者
Lee, Jung-Seuk [1 ]
Jeon, Jun-Cheol [1 ]
Yoo, Kee-Young [1 ]
机构
[1] Department of Computer Engineering, Kyungpook National University
来源
Operating Systems Review (ACM) | 2004年 / 38卷 / 02期
关键词
Algorithms - Computer system firewalls - Cryptography - Mobile computing;
D O I
10.1145/991130.991136
中图分类号
学科分类号
摘要
This paper discusses the problem of protecting security policies and other related information in security mechanism, such as the filtering policy of a firewall in distributed or ubiquitous environment. Unauthorized disclosure of such information might reveal the fundamental principles and methods for the protection of the whole network. We discuss the problem with typical protecting method using hash functions and we propose a scheme that protects the rule in firewall using cryptographic algorithm.
引用
收藏
页码:69 / 72
相关论文
共 50 条
  • [21] A unified firewall model for web security
    Nalepa, Grzegorz J.
    Advances in Intelligent Web Mastering, 2007, 43 : 248 - 253
  • [22] DESIGN OF FIREWALL SECURITY CONTROL PROGRAM
    Zhang, Wanchen
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5999 - 6002
  • [23] Security Effectiveness and a Hardware Firewall for MPSoCs
    Grammatikakis, Miltos D.
    Papadimitriou, Kyprianos
    Petrakis, Polydoros
    Papagrigoriou, Antonis
    Kornaros, George
    Christoforakis, Ioannis
    Coppola, Marcello
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1032 - 1039
  • [24] STRENGTHENING FEELING OF SECURITY INSTEAD OF PROTECTING SECURITY
    WALDMANN, PK
    POLITISCHE STUDIEN, 1978, 29 (240) : 359 - 377
  • [25] SECURITY POLICIES AND THEIR CONNECTION WITH SECURITY STRATEGY AND SECURITY MANAGEMENT
    LIPPOLD, H
    STELZER, D
    KONRAD, P
    WIRTSCHAFTSINFORMATIK, 1992, 34 (04): : 367 - 377
  • [26] Protecting security and privacy
    Kohno, Tadayoshi
    TECHNOLOGY REVIEW, 2007, 110 (05) : 36 - 36
  • [27] Protecting retirement security
    Boarman, WJ
    EMPLOYEE BENEFIT ISSUES, VOL 45: THE MULTIEMPLOYER PERSPECTIVE, 2004, 45 : 174 - 179
  • [28] Protecting homeland security
    Moffett, Donald
    Texas Transportation Researcher, 2002, 38 (04):
  • [29] Security policies
    Anderson, R
    Stajano, F
    Lee, JH
    ADVANCES IN COMPUTERS, VOL 55, 2001, 55 : 185 - 235
  • [30] Proxy re-signature scheme with cryptographic reverse firewall for medical data security
    Yang, Xiaodong
    Wei, Lizhen
    Li, Songyu
    Du, Xiaoni
    Wang, Caifen
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (05) : 3459 - 3475