Dynamic parameterization of IPSEC
Agar, Christopher D.
Irvine, Cynthia E.
MetadataShow full item record
The Internet has become the medium of choice for communications between most Government and Military organizations. Unfortunately the key Internet protocols were not designed to provide security and their security vulnerabilities have become apparent. IPsec was developed to provide users with a range of security services, for both confidentiality and integrity, enabling them to securely pass information across networks. Automated security mechanisms are typically designed and/or calibrated to meet an organizationÎ±s security policy. However, once the mechanism is in operation the implemented policy is in a static state, and cannot be adjusted according to dynamic environmental conditions. This means that security mechanisms fail to reflect the policy that is appropriate for the changing contexts. Dynamic parameterization enables security mechanisms to adjust the level of security service 'on-the- fly' to respond to changing conditions (i.e. INFOCON, THREATCON). This work includes the extension of the attributes encoded by the KeyNote Trust Management System and modification of the IPsec mechanism to incorporate dynamic parameters into the security service selection mechanism, and the construction of a graphical user interface, for demonstrating 'proofof- concept' of Dynamic Parameterization of OpenBSD 2.8 IPsec.
Showing items related by title, author, creator and subject.
Mohan, Raj; Levin, Timothy E.; Irvine, Cynthia E. (Computer Security Applications Conference (ACSAC), 2003-12-08);The IPSec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks. Dynamic parameterization of IPSec, via ...
Mohan, Raj. (Monterey, California. Naval Postgraduate School, 2003-12);TCP/IP provided the impetus for the growth of the Internet and the IPsec protocol now promises to add to it the desired security strength. IPsec provides users with a mechanism to enforce a range of security services for ...
Chiang, Ken H. (Monterey, California. Naval Postgraduate School, 2006-09);Control of access to information based on temporal attributes has many potential applications. Examples include student user accounts set to expire upon graduation; files marked as time-sensitive so that their contents ...