Kwon et al., 2021 - Google Patents
Mondrian: Comprehensive Inter-domain Network Zoning Architecture.Kwon et al., 2021
View PDF- Document ID
- 5530803840516059421
- Author
- Kwon J
- Hähni C
- Bamert P
- Perrig A
- Publication year
- Publication venue
- NDSS
External Links
Snippet
A central element of designing IT security infrastructures is the logical segmentation of information assets into network zones sharing the same security requirements and policies. As more business ecosystems are migrated to the cloud, additional demands for …
- 238000004891 communication 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mehic et al. | Quantum cryptography in 5g networks: A comprehensive overview | |
| US9461975B2 (en) | Method and system for traffic engineering in secured networks | |
| Casado et al. | SANE: A Protection Architecture for Enterprise Networks. | |
| Agborubere et al. | OpenFlow communications and TLS security in software-defined networks | |
| Cynthia et al. | Security protocols for IoT | |
| US20180343238A1 (en) | System and method for protecting communications | |
| US20180375841A1 (en) | Systems and methods for enterprise communications | |
| Li et al. | Mandatory content access control for privacy protection in information centric networks | |
| EP3100405A2 (en) | Systems and methods for protecting communications | |
| EP4323898B1 (en) | Computer-implemented methods and systems for establishing and/or controlling network connectivity | |
| US10021070B2 (en) | Method and apparatus for federated firewall security | |
| Li et al. | Enhancing the trust of internet routing with lightweight route attestation | |
| Samociuk | Secure communication between openflow switches and controllers | |
| Liyanage et al. | Secure hierarchical VPLS architecture for provider provisioned networks | |
| Kwon et al. | SVLAN: Secure & scalable network virtualization | |
| Tupakula et al. | Implementation of techniques for enhancing security of southbound infrastructure in SDN | |
| Benzekki et al. | Devolving IEEE 802.1 X authentication capability to data plane in software‐defined networking (SDN) architecture | |
| Kwon et al. | Mondrian: Comprehensive Inter-domain Network Zoning Architecture. | |
| Pandya et al. | Framework for securing SDN southbound communication | |
| Jiang et al. | Security‐Oriented Network Architecture | |
| Chifor et al. | IoT Cloud Security Design Patterns | |
| Huda et al. | A Proposed Cryptography Key Management in Software-Defined Networking (SDN) | |
| Hähni | Mondrian: A Comprehensive Inter-Domain Network Zoning Architecture | |
| Saxena et al. | SMAC: Scalable access control in IoT | |
| Zubair et al. | Design, implement, and evaluate the performance of an IPsec inspired security framework for HIP-VPLS environments |