Security Architecture for the Internet Protocol
Citations
39 citations
Cites background from "Security Architecture for the Inter..."
...To this end, we show how our policy reconciliation framework can augment IPsec’s existing policy negotiation and support the Condor distributed computing system....
[...]
...The IPsec [19] suite of protocols provides source authentication, data integrity and data confidentiality at the IP layer....
[...]
...In practice, we have found the vast majority of IPsec configurations use group 2....
[...]
...Each IPsec node (host or security gateway) maintains a security and compression policy defined in terms of these transforms....
[...]
...Figure 1 shows a graphical provisioning policy for key management used in an IPsec VPN....
[...]
39 citations
39 citations
39 citations
39 citations
References
14,980 citations
3,501 citations
2,671 citations
2,112 citations
[...]
1,967 citations