Security as services in active networks

Zhaoyu Liu, Roy H. Campbell, M. Dennis Mickunas

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper discusses the design and implementation for supporting customized security services in active networks using active networking principles. The customized security services support is based on a secure node architecture that includes an active node operating system security API, an active security guardian, and quality of protection provisions. The support of highly customized security services permits active nodes to satisfy the application-specific dynamic security and protection requirements. It associates quality of protection with network software and application security. Applications can dynamically select the suitable security configurations and services at each active routing node, based on their security and performance requirements. The secure node architecture, together with the support of dynamically customized security services, can provide a fundamental base for securing the active network infrastructure and active applications.

Original languageEnglish (US)
Title of host publicationProceedings - ISCC 2002
Subtitle of host publication7th International Symposium on Computers and Communications
Pages883-890
Number of pages8
DOIs
StatePublished - Dec 1 2002
Event7th International Symposium on Computers and Communications, ISCC 2002 - Taormina-Giardini Naxos, Italy
Duration: Jul 1 2002Jul 4 2002

Publication series

NameProceedings - IEEE Symposium on Computers and Communications
ISSN (Print)1530-1346

Other

Other7th International Symposium on Computers and Communications, ISCC 2002
CountryItaly
CityTaormina-Giardini Naxos
Period7/1/027/4/02

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Mathematics(all)
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Security as services in active networks'. Together they form a unique fingerprint.

Cite this