Network security policy for large-scale VPN

被引:0
|
作者
Shan, RS [1 ]
Li, SH [1 ]
Wang, MZ [1 ]
Li, JH [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
关键词
trusted domain; security policy; VPN;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the current VPN, manual security policy configuration is usually inefficient and error-prone. The paper studies the problem of conflicts among policies in different domains of a large-scale VPN. In this paper, a new trusted domain and a novel security transmission model as the fundament of the security theory of VPN are defined, and based on them, the exact definition of security transmission requirements and the corresponding effective security policies for a large-scale V'PN are proposed. In addition, this paper gives the principles of policy verification for the purpose of checking the consistence of security policies in the whole network environment.
引用
收藏
页码:217 / 220
页数:4
相关论文
共 50 条
  • [41] NSGZero: Efficiently Learning Non-exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree Search
    Xue, Wanqi
    An, Bo
    Yeo, Chai Kiat
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 4646 - 4653
  • [42] Large-scale farming in China: An appropriate policy?
    Prosterman, R
    Hanstad, T
    Ping, L
    JOURNAL OF CONTEMPORARY ASIA, 1998, 28 (01) : 74 - 102
  • [43] LARGE-SCALE POLICY MAKING - SCHULMAN,PR
    HOFFERBERT, RI
    AMERICAN POLITICAL SCIENCE REVIEW, 1981, 75 (03) : 783 - 784
  • [44] A policy propagation model using mobile agents in large-scale distributed network environments
    Kim, TK
    Lee, DY
    Byeon, OH
    Chung, TM
    SERVICE-ORIENTED COMPUTING - ICSOC 2003, 2003, 2910 : 514 - 526
  • [45] GRAPH NEURAL NETWORK FOR LARGE-SCALE NETWORK LOCALIZATION
    Yan, Wenzhong
    Jin, Di
    Lin, Zhidi
    Yin, Feng
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 5250 - 5254
  • [46] Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints
    Zhao, Yao
    Zhu, Zhaosheng
    Chen, Yan
    Pei, Dan
    Wang, Jia
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 531 - +
  • [47] Large-scale Security Measurements on the Android Firmware Ecosystem
    Hou, Qinsheng
    Diao, Wenrui
    Wang, Yanhao
    Liu, Xiaofeng
    Liu, Song
    Ying, Lingyun
    Guo, Shanqing
    Li, Yuanzhi
    Nie, Meining
    Duanz, Haixin
    2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 1257 - 1268
  • [48] A wearable computing environment for the security of a large-scale factory
    Huang, Jiung-yao
    Tsai, Chung-Hsien
    HUMAN-COMPUTER INTERACTION, PT 2, PROCEEDINGS, 2007, 4551 : 1113 - +
  • [49] Recent advances in security and privacy in large-scale networks
    Yu, Yong
    Mu, Yi
    Lu, Rongxing
    Ren, Jian
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1080 - 1082
  • [50] Security domains: Key management in large-scale systems
    Michener, JR
    Acar, T
    IEEE SOFTWARE, 2000, 17 (05) : 52 - +