TY - GEN
T1 - NeoMAN
T2 - 2008 International Conference on Security Technology, SecTech 2008
AU - Zhen, Zhao
AU - Kim, Taehyoung
AU - Kim, Jung Han
AU - Kim, In Hyuk
AU - Eom, Young Ik
PY - 2008
Y1 - 2008
N2 - IPSec VPN is widely used to protect remote data access. IKE protocol is the mandatory key management protocol of IPSec protocol, it provides a manual configuration method for IPSec VPN. But manual configuration is complex, unreliable, unmanageable, and especially less of support for cross-domain management. This paper proposes an IKE negotiation management system based on X.509, called NeoMAN. The NeoMAN system is designed to analysis the security requirements in intra-/crossdomain, provides cross-domain security requirement negotiation, security policy generation, and automatic IKE client configuration. The proposed method reduces the complexity of the IKE configuration process, improves the adaptability of the IKE protocol in cross-domain application, and also provides the management approach for IPSec VPN application.
AB - IPSec VPN is widely used to protect remote data access. IKE protocol is the mandatory key management protocol of IPSec protocol, it provides a manual configuration method for IPSec VPN. But manual configuration is complex, unreliable, unmanageable, and especially less of support for cross-domain management. This paper proposes an IKE negotiation management system based on X.509, called NeoMAN. The NeoMAN system is designed to analysis the security requirements in intra-/crossdomain, provides cross-domain security requirement negotiation, security policy generation, and automatic IKE client configuration. The proposed method reduces the complexity of the IKE configuration process, improves the adaptability of the IKE protocol in cross-domain application, and also provides the management approach for IPSec VPN application.
UR - https://www.scopus.com/pages/publications/60349099884
U2 - 10.1109/SecTech.2008.13
DO - 10.1109/SecTech.2008.13
M3 - Conference contribution
AN - SCOPUS:60349099884
SN - 9780769534862
T3 - Proceedings - 2008 International Conference on Security Technology, SecTech 2008
SP - 226
EP - 229
BT - Proceedings - 2008 International Conference on Security Technology, SecTech 2008
Y2 - 13 December 2008 through 15 December 2008
ER -