Techniques for improving the security and manageability of IPsec policy.
Jonathan T. TrostleBill GossmanPublished in: Int. J. Inf. Sec. (2005)
Keyphrases
- network security
- information security
- key exchange
- security issues
- access control
- trust negotiation
- intrusion detection
- security problems
- authentication protocol
- optimal policy
- data security
- security threats
- database
- key management
- policy enforcement
- statistical databases
- security level
- security properties
- security requirements
- security protocols
- computer security
- access control policies
- security management
- security policies
- dynamic programming
- data mining