Centralized Management of Virtual Security Zones in IP Networks

Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Abstract

    The growing security awareness among business users of networks based on Internet Protocol has emerged a need to control the security policies of the network nodes. The nodes can be distributed all over the Internet. The node configuration that is used to enforce the security policy is typically set by hand which is time consuming and error prone. Thus there is a need for centralized management system of the security policies of the nodes.

    In this paper we suggest that the roles of network and security administrators should be separated. We have designed a system for centralized security policy management and made a prototype implementation of it. With our system we can control security policies of the nodes securely and remotely from a centralized management node.
    Original languageEnglish
    Title of host publicationApplied Cryptography and Network Security, Huangshan, China, 8.-11.6.2004
    EditorsMarkus Jakobson, Moti Young, Jianying Zhou
    Place of PublicationGermany
    Pages91-102
    Publication statusPublished - 2004
    MoE publication typeA4 Article in a conference publication
    EventInternational Conference on Applied Cryptography and Network Security - Huangshan, China
    Duration: 8 Jun 200411 Jun 2004
    Conference number: 2

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume3089
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    ConferenceInternational Conference on Applied Cryptography and Network Security
    Abbreviated titleACNS
    CountryChina
    CityHuangshan
    Period08/06/200411/06/2004

    Keywords

    • security policy management
    • virtual security zones

    Fingerprint Dive into the research topics of 'Centralized Management of Virtual Security Zones in IP Networks'. Together they form a unique fingerprint.

    Cite this