Trust in Security-Policy Enforcement Mechanisms

2006 ◽  
Author(s):  
Fred B. Schneider ◽  
Greg Morrisett
Author(s):  
Jim Alves-Foss ◽  
Jia Song ◽  
A. Scott Amack ◽  
Lawrence Kerr ◽  
Stuart Steiner

2021 ◽  
Vol 12 (2) ◽  
pp. 126
Author(s):  
Enrico Russo ◽  
Luca Verderame ◽  
Alessandro Armando ◽  
Alessio Merlo

2010 ◽  
Vol 1 (1) ◽  
pp. 79-94 ◽  
Author(s):  
Janne Lindqvist ◽  
Essi Vehmersalo ◽  
Miika Komu ◽  
Jukka Manner

Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile clients. The HIP-based firewall learns the identity of a client when it communicates with the server over HIP. The firewall configures the necessary rules based on HIP control messages passing through the firewall. The solution is secure and flexible, and introduces only minimal latency to the initial HIP connection establishment.


2011 ◽  
Vol 16 (6) ◽  
pp. 631-641 ◽  
Author(s):  
Hammad Banuri ◽  
Masoom Alam ◽  
Shahryar Khan ◽  
Jawad Manzoor ◽  
Bahar Ali ◽  
...  

2009 ◽  
Vol 44 (3) ◽  
pp. 268-287 ◽  
Author(s):  
Moritz Weiss ◽  
Simon Dalferth

In this article, we argue that the premature abolishment of the allegedly anachronistic concepts of internal versus external security is of doubtful heuristic value for the study of security practices. The two domains may gradually converge from the perspective of problems, but do so much less in terms of political practices. We show that security policy is pursued according to different systems of rules. It follows distinct institutional logics. We undertake a systematic comparison of policy-making in the European Union’s Security and Defence Policy (ESDP) and Justice and Home Affairs (JHA). It is structured along the distinction between making and implementing an agreement as indicative stages of the policy-making process. First, rule-setting asks how decisions are made in the two domains: with or without the inclusion of external actors. Second, we explore whether the implementation of political decisions involves management or enforcement mechanisms. The empirical results are unambiguous: the political actors follow different systems of rules in the two domains. There are still ‘ideal-typical’ differences in a Weberian sense. This implies that internal and external security may be closely linked, like the opposite sides of the same coin, but must be separated for the purpose of analytical clarity.


Sign in / Sign up

Export Citation Format

Share Document