[go: up one dir, main page]

Choo, 1999 - Google Patents

Vaulted {VPN}: Compartmented Virtual Private Networks on Trusted Operating {SystemsTse-Huong} Choo,{Hewlett-Packard} Laboratories

Choo, 1999

View HTML
Document ID
4847869894601745372
Author
Choo T
Publication year
Publication venue
8th USENIX Security Symposium (USENIX Security 99)

External Links

Snippet

Virtual Private Networks for IPSec based on an intermediate packet-redirector in network- protocol stacks are becoming increasingly common for many standard operating systems and represent a well-understood method for retro-fitting such systems with IPSec support …
Continue reading at www.usenix.org (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
US12333032B2 (en) Data access control systems and methods
Loscocco et al. The inevitability of failure: The flawed assumption of security in modern computing environments
US20010044904A1 (en) Secure remote kernel communication
US20070234412A1 (en) Using a proxy for endpoint access control
US20070006294A1 (en) Secure flow control for a data flow in a computer and data flow in a computer network
US8607302B2 (en) Method and system for sharing labeled information between different security realms
CN101681404A (en) Distributed computer system
WO2003079629A1 (en) Secured web entry server
Schwarz et al. {SENG}, the {SGX-Enforcing} Network Gateway: Authorizing Communication from Shielded Clients
US20020116644A1 (en) Adapter card for wirespeed security treatment of communications traffic
Walther et al. RATLS: Integrating transport layer security with remote attestation
Lee et al. S2Net: Preserving privacy in smart home routers
Will et al. Trusted inter-process communication using hardware enclaves
Xu et al. Virtualization of the encryption card for trust access in cloud computing
Lal et al. Data Processing Unit's Entry into Confidential Computing
Choo VAULTEDVPN: COMPARTMENTEDVIRTUAL PRIVATENETWORKSONTRUS TED OPERATINGSYSTEMS
Elphinstone Future directions in the evolution of the L4 microkernel
Choo Vaulted {VPN}: Compartmented Virtual Private Networks on Trusted Operating {SystemsTse-Huong} Choo,{Hewlett-Packard} Laboratories
Vaulted Proceedings of the 8th USENIX Security Symposium, August 23-36, 1999, Washington, DC [Technical Program]
Choo Proceedings of the 3rd USENIX Windows NT Symposium, July 12-15, 1999, Seattle, Washington [Technical Program] Vaulted VPN: Compartmented Virtual Private Networks On Trusted Operating Systems
Helmuth et al. Mikro-SINA—Hands-on Experiences with the Nizza Security Architecture
RU2276466C1 (en) Method for creating protected virtual networks
Park et al. EnclaveVPN: Toward optimized utilization of enclave page cache and practical performance of data plane for security-enhanced cloud VPN
Dimitrov et al. Challenges and new technologies for addressing security in high performance distributed environments
Yasmin et al. Investigating the possibility of data leakage in time of live VM migration