Choo, 1999 - Google Patents
Vaulted {VPN}: Compartmented Virtual Private Networks on Trusted Operating {SystemsTse-Huong} Choo,{Hewlett-Packard} LaboratoriesChoo, 1999
View HTML- Document ID
- 4847869894601745372
- Author
- Choo T
- Publication year
- Publication venue
- 8th USENIX Security Symposium (USENIX Security 99)
External Links
Snippet
Virtual Private Networks for IPSec based on an intermediate packet-redirector in network- protocol stacks are becoming increasingly common for many standard operating systems and represent a well-understood method for retro-fitting such systems with IPSec support …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12333032B2 (en) | Data access control systems and methods | |
| Loscocco et al. | The inevitability of failure: The flawed assumption of security in modern computing environments | |
| US20010044904A1 (en) | Secure remote kernel communication | |
| US20070234412A1 (en) | Using a proxy for endpoint access control | |
| US20070006294A1 (en) | Secure flow control for a data flow in a computer and data flow in a computer network | |
| US8607302B2 (en) | Method and system for sharing labeled information between different security realms | |
| CN101681404A (en) | Distributed computer system | |
| WO2003079629A1 (en) | Secured web entry server | |
| Schwarz et al. | {SENG}, the {SGX-Enforcing} Network Gateway: Authorizing Communication from Shielded Clients | |
| US20020116644A1 (en) | Adapter card for wirespeed security treatment of communications traffic | |
| Walther et al. | RATLS: Integrating transport layer security with remote attestation | |
| Lee et al. | S2Net: Preserving privacy in smart home routers | |
| Will et al. | Trusted inter-process communication using hardware enclaves | |
| Xu et al. | Virtualization of the encryption card for trust access in cloud computing | |
| Lal et al. | Data Processing Unit's Entry into Confidential Computing | |
| Choo | VAULTEDVPN: COMPARTMENTEDVIRTUAL PRIVATENETWORKSONTRUS TED OPERATINGSYSTEMS | |
| Elphinstone | Future directions in the evolution of the L4 microkernel | |
| Choo | Vaulted {VPN}: Compartmented Virtual Private Networks on Trusted Operating {SystemsTse-Huong} Choo,{Hewlett-Packard} Laboratories | |
| Vaulted | Proceedings of the 8th USENIX Security Symposium, August 23-36, 1999, Washington, DC [Technical Program] | |
| Choo | Proceedings of the 3rd USENIX Windows NT Symposium, July 12-15, 1999, Seattle, Washington [Technical Program] Vaulted VPN: Compartmented Virtual Private Networks On Trusted Operating Systems | |
| Helmuth et al. | Mikro-SINA—Hands-on Experiences with the Nizza Security Architecture | |
| RU2276466C1 (en) | Method for creating protected virtual networks | |
| Park et al. | EnclaveVPN: Toward optimized utilization of enclave page cache and practical performance of data plane for security-enhanced cloud VPN | |
| Dimitrov et al. | Challenges and new technologies for addressing security in high performance distributed environments | |
| Yasmin et al. | Investigating the possibility of data leakage in time of live VM migration |