[go: up one dir, main page]

Kwon et al., 2021 - Google Patents

Mondrian: Comprehensive Inter-domain Network Zoning Architecture.

Kwon et al., 2021

View PDF
Document ID
5530803840516059421
Author
Kwon J
Hähni C
Bamert P
Perrig A
Publication year
Publication venue
NDSS

External Links

Snippet

A central element of designing IT security infrastructures is the logical segmentation of information assets into network zones sharing the same security requirements and policies. As more business ecosystems are migrated to the cloud, additional demands for …
Continue reading at scionproto-contrib.github.io (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Mehic et al. Quantum cryptography in 5g networks: A comprehensive overview
US9461975B2 (en) Method and system for traffic engineering in secured networks
Casado et al. SANE: A Protection Architecture for Enterprise Networks.
Agborubere et al. OpenFlow communications and TLS security in software-defined networks
Cynthia et al. Security protocols for IoT
US20180343238A1 (en) System and method for protecting communications
US20180375841A1 (en) Systems and methods for enterprise communications
Li et al. Mandatory content access control for privacy protection in information centric networks
EP3100405A2 (en) Systems and methods for protecting communications
EP4323898B1 (en) Computer-implemented methods and systems for establishing and/or controlling network connectivity
US10021070B2 (en) Method and apparatus for federated firewall security
Li et al. Enhancing the trust of internet routing with lightweight route attestation
Samociuk Secure communication between openflow switches and controllers
Liyanage et al. Secure hierarchical VPLS architecture for provider provisioned networks
Kwon et al. SVLAN: Secure & scalable network virtualization
Tupakula et al. Implementation of techniques for enhancing security of southbound infrastructure in SDN
Benzekki et al. Devolving IEEE 802.1 X authentication capability to data plane in software‐defined networking (SDN) architecture
Kwon et al. Mondrian: Comprehensive Inter-domain Network Zoning Architecture.
Pandya et al. Framework for securing SDN southbound communication
Jiang et al. Security‐Oriented Network Architecture
Chifor et al. IoT Cloud Security Design Patterns
Huda et al. A Proposed Cryptography Key Management in Software-Defined Networking (SDN)
Hähni Mondrian: A Comprehensive Inter-Domain Network Zoning Architecture
Saxena et al. SMAC: Scalable access control in IoT
Zubair et al. Design, implement, and evaluate the performance of an IPsec inspired security framework for HIP-VPLS environments