A. Savanovic, S. Karnouskos, D. Gabrijelcic, F. Mocilar
{"title":"A security architecture for future active IP networks","authors":"A. Savanovic, S. Karnouskos, D. Gabrijelcic, F. Mocilar","doi":"10.1109/ECUMN.2002.1002098","DOIUrl":null,"url":null,"abstract":"Active networks allow user-controlled network programmability. A security framework has to assure that our infrastructure will behave as expected and will efficiently deal with malicious attacks, unauthorized attempts to execute active code etc. We present here a security architecture that is designed within the FAIN project and aims at supporting multiple heterogeneous execution environments. We argue for the pros and cons as well as why we have selected the specific components and also take a look at their interworking in order to provide the security services to the execution environments of our active network node hosts.","PeriodicalId":398555,"journal":{"name":"2nd European Conference on Universal Multiservice Networks. ECUMN'2001 (Cat. No.02EX563)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2nd European Conference on Universal Multiservice Networks. ECUMN'2001 (Cat. No.02EX563)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECUMN.2002.1002098","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Active networks allow user-controlled network programmability. A security framework has to assure that our infrastructure will behave as expected and will efficiently deal with malicious attacks, unauthorized attempts to execute active code etc. We present here a security architecture that is designed within the FAIN project and aims at supporting multiple heterogeneous execution environments. We argue for the pros and cons as well as why we have selected the specific components and also take a look at their interworking in order to provide the security services to the execution environments of our active network node hosts.