scispace - formally typeset
Open AccessPosted Content

A Technical Comparison of IPSec and SSL.

TLDR
In this paper, the authors present an analysis of security and performance properties for IPSec and SSL in terms of IP Security and SSL Secure Socket Layer (SSL SLL) protocols.
Abstract
IPSec IP Security and SSL Secure Socket Layer have been the most robust and most potential tools available for securing communications over the Inter net Both IPSec and SSL have advantages and short comings Yet no paper has been found comparing the two protocols in terms of characteristic and functional ity Our objective is to present an analysis of security and performance properties for IPSec and SSL

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Addressing cloud computing security issues

TL;DR: This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment, and presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.
Patent

System and Method for Providing Access Control

TL;DR: In this paper, a control device may be configured to monitor a network connection and a client device may send a first network communication destined for a network communicatively connected to the control device.
Journal ArticleDOI

The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD)

TL;DR: A novel method for constructing a key management service is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site and a key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users.
Journal ArticleDOI

Multi-Faceted Assessment of a Wireless Communications Infrastructure for the Green Neighborhoods of the Smart Grid

TL;DR: The main goal of this paper is to evaluate the core M2M communications infrastructure of a platform designed to reduce electricity consumption and integrate renewable generation at residential level, fully based on widely deployed wireless communications technologies such as IEEE 802.11 and General Packet Radio Service.
Proceedings ArticleDOI

Guiding the selection of security patterns based on security requirements and pattern classification

TL;DR: This paper aims at guiding the selection of security patterns in security PBSE based on security risk management results and pattern classification and considers an example of a SCADA system.
References
More filters

IP Encapsulating Security Payload (ESP)

S. Kent, +1 more
TL;DR: This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6.

The Internet Key Exchange (IKE)

D. Harkins, +1 more
TL;DR: ISAKMP ([MSST98]) provides a framework for authentication and key exchange but does not define them.

IP Authentication Header

S. Kent, +1 more
TL;DR: This document describes an updated version of the IP Authentication Header (AH), which is designed to provide authentication services in IPv4 and IPv6, and obsoletes RFC 2402 (November 1998).
Book

SSL and TLS: Designing and Building Secure Systems

Eric Rescorla
TL;DR: The Story So Far: Protecting Secrets in Memory, a Simple Secure Messaging System, and Coding with SSL, which describes the challenges of designing and implementing such a system.

Internet Security Association and Key Management Protocol (ISAKMP) Status of this Memo

TL;DR: The Internet Security Association and Key Management Protocol (ISAKMP) as discussed by the authors is a key management protocol that allows the creation and management of security associations, key generation techniques, and threat mitigation (e.g. denial of service and replay attacks).