Open Access
The Transport Layer Security (TLS) Protocol Version 1.2
Eric Rescorla
- Vol. 5246, pp 1-104
Reads0
Chats0
TLDR
This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol, which provides communications security over the Internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.Abstract:
This document specifies Version 1.2 of the Transport Layer Security
(TLS) protocol. The TLS protocol provides communications security over
the Internet. The protocol allows client/server applications to
communicate in a way that is designed to prevent eavesdropping,
tampering, or message forgery. [STANDARDS-TRACK]read more
Citations
More filters
Journal ArticleDOI
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
TL;DR: This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues and analyzes the open challenges and strategies for future research work in the area.
ReportDOI
Guide to Attribute Based Access Control (ABAC) Definition and Considerations
Vincent C. Hu,David F. Ferraiolo,D. Richard Kuhn,Adam Schnitzer,Kenneth Sandlin,Robert Miller,Karen A. Scarfone +6 more
TL;DR: This document provides Federal agencies with a definition of attribute based access control (ABAC) and considerations for using ABAC to improve information sharing within organizations and between organizations while maintaining control of that information.
Proceedings ArticleDOI
On Technical Security Issues in Cloud Computing
TL;DR: This paper focuses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations.
Patent
Secure data parser method and system
TL;DR: A secure data parser as discussed by the authors parses data and then splits the data into multiple portions that are stored or communicated distinctly, which can be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
Proceedings ArticleDOI
SCONE: secure Linux containers with Intel SGX
Sergei Arnautov,Bohdan Trach,Franz Gregor,Thomas Knauth,Andre Martin,Christian Priebe,Joshua Lind,Divya Muthukumaran,Dan O'Keeffe,Mark Stillwell,David Goltzsche,David Eyers,Rüdiger Kapitza,Peter Pietzuch,Christof Fetzer +14 more
TL;DR: SCONE is a secure container mechanism for Docker that uses the SGX trusted execution support of Intel CPUs to protect container processes from outside attacks and offers a secure C standard library interface that transparently encrypts/decrypts I/O data.