A Person-Oriented Ubiquitous and Secure Information Communication Environment Supported by Data-Driven Networking Processor

Size: px
Start display at page:

Download "A Person-Oriented Ubiquitous and Secure Information Communication Environment Supported by Data-Driven Networking Processor"

Transcription

1 A Person-Oriented Ubiquitous and Secure Information Communication Environment Supported by Data-Driven Networking Processor Hiroshi Ishii Department of CommunicationEngineering School of Information Technology and Electronics Tokai University 1117 Kitakaname, Hiratsuka Kanagawa , JAPAN Yoshitsugu Kondo NTT Information Sharing Platform Laboratories, Nippon Telegraph and Telephone Corporation, , Midori-cho, Musashino, Tokyo , JAPAN Hiroaki Nishikawa Department of Computer Science, Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba Science City, Ibaraki , JAPAN Abstract - This paper proposes a basic concept of person-oriented ubiquitous and secure information sharing environment. In the ubiquitous network environment, people, within a predefined restriction, can access and use information, network and computing resources wherever and whenever they are. Here, the owner of the resource and/or information is not necessarily same as the user. At the same time, the user specific information does exist which is owned by the user itself but often managed by other organization. So the secure and safe resource management is required. We propose two approaches for consolidating the ubiquitous and secure information sharing platform, one is right-token management platform and the other is use of objective-specific VPN. We also propose to use a data-driven networking processor as a hardware platform supporting above resource and data management platform layers, which has in nature the passiveness and high real-time multi-processing capability. We propose to use it as engines for continuous authentication and enciphering at the terminal side and communication protocol handlers, authentication and enciphering in the network. keywords: authentication, ubiquitous services, information sharing, VPN, data-driven processor 1. Introduction This paper proposes a basic concept of person-oriented ubiquitous and secure information sharing environment. Nowadays, so-called ubiquitous service is under realization, which enables us to access and utilize versatile computing and network resources and information wherever and whenever we are. Considering public phone service as one of legacy ones, we can use it whenever and wherever the phone is available if we pay for it. This example can be generalized for ubiquitous communication world, i.e., if the user profile is within a restriction specific to the resource and/or information users want to access, he or she can use it. Here, of course, the owner of the resource and/or information is not necessarily same as the user. At the same time, the user specific information does exist which is owned by the user itself. The information is often managed and stored by other organizations than the user. For instance, clinical records are managed and stored by clinics and hospital, banking information is by banks, and so on. It is not realistic to store all of this type of user-specific information in such tamper resistant equipment as IC cards. So, secure management and access to the information are also important requirements in the ubiquitous

2 communication environment. And multiple type of personal information each of which has different attributes and is managed in the different organizations need mechanism for association to harmonize each other, e.g. matching between medical and medicinal personal information. In addition, as a preliminary phase before information and resource management stage, the authenticity of living body (bio-metrics authentication) is also important issue. Considering the case where service utilizes services having multiple associations with multiple information and resources, processing bottleneck cannot be ignored. This paper proposes followings to satisfy those requirements above. First, we propose ubiquitous computing resource network management framework focusing on the right-token management and describe how to realize the platform on which users can access necessary resources under appropriate conditions. Second, by use of computing and network resource which becomes accessible through above platform, we propose remote access mechanism to the VPN which manages each type of information and policy matching mechanism between different VPNs. Finally, for the purpose of data access authentication and avoidance of processing bottleneck caused by simultaneous parallel processing, we will apply data-driven networking processor. We describe the architecture and VLSI realization of the data-driven processor. 2. Ubiquitous computing resource network management framework In recent years, the search for next-generation information environments has been a popular pursuit. Concepts that have been put forward include EasyLiving [1], AwareHome [2] and Context-Aware User Authentication [3]. All three involve the recognition of particular people by systems installed at particular locations, with the aim of offering each person specific services or information. In contrast to this, actualizing ubiquitous computing resources on networks requires that people be able to use the resources and find some value in doing so. The key point here is to create a situation in which people are able to select and use ubiquitous computing resources on demand. However, we also want to be able to restrict the number of times a resource can be used or the length of time over which it can be used. Further desirable restrictions include the restriction of resource usage to particular locations and to particular people. Resource here indicates a broad category that includes digital content, network resources, computational resources, storage resources, and applications. A platform that has these features will be particularly helpful when users are able to roam across usage environments. We need to try to separate the right to use ubiquitous-resources from ownership of the ubiquitous-resources or devices. A simple basis for this is a concept of right-tokens. Only a user who has the correct right-token is given access to a ubiquitous-resource or device. The user need not possess the resource or device. This is similar to the concept of electronic ticket systems, such as FlexTicket [4]. However, the focus of existing systems has been on ensuring the correctness of the electronic tokens (tickets). They do not tackle the situation of a user roaming through various usage environments, where the requirement is that the system should offer customized services according to user attributes or in response to current user needs. We have thus been considering a network platform that includes mechanisms for issuing and dynamically distributing right-tokens, which are essentially sets of conditions on ubiquitous-resource usage. Conditions specified by the tokens might include permission for user access to particular kinds of ubiquitous-resources, permission to use devices belonging to a particular owner, and numbers of times or lengths of time over which usage is allowed. To achieve this, the platform will have to be able to assess the applicability of right-tokens, and this will be particularly desirable in localized environments. We refer to the platform as a right-token management platform. The platform must autonomously and

3 dynamically control ubiquitous-resource utilization on the basis of conditions described in right-tokens and profiles of users and devices. The respective types of profile are stored in IC cards and embedded secure ICs (Fig. 1), both of which can contain right tokens. To control ubiquitous-resource utilization on a local basis according to profiles stored in IC cards or secure ICs, we need to select suitable entities and clarify a framework of trust (right-token management framework). The latter should be defined in terms of trust relationships among entities, so that each is able to ascertain the profile and access rights of others. Therefore, we propose a model of entity roles in the right-token management framework. That is, we describe the entities, the trust relationships among the entities that guarantee the authenticity of the respective types of profile. We also cover the access-control model of the right-token management framework, which describes the access-right transfer relationships among the entities. Through experiments with a prototype system, we confirmed the effectiveness of our approach, especially in terms of functionality and security of the proposed right-token management framework. Secure IC IC card User Profile Device Profile Judgment Mechanism Judgment results Device Outline of Configuration IDs ( ID, Issuer ID, etc.) conditions Keys to start to use target objects Signature Signature target area Fig. 1 judgment mechanism We plan to adapt the right-token management framework to other target resources, such as wireless network resources, thus demonstrating its applicability as a general-purpose framework. In the near future, we will investigate the possibility of avoiding the need to construct secure channels by having right-token judgment executed inside the IC chips. 3. Data management by closed network Accessibility control to the information or resource that is common to some restricted people is described in section 2. Here, we discuss a person-specific data management. Personal data must be got in case where the user needs it and at the same time the data must be managed in a secure manner. One typical example is the IC card within which much volume of personal data is stored. Although it is easy for the user to access the information, it is not realistic to store all the information in IC card. Another is the cases where user s data is stored in the hard disk of his own PC or where it is stored and managed by a service provider to which user-specific data is given by the user itself for a specific objective. In this case, we have to consider safe and secure data access mechanism.

4 The data management proposed here is achieved by use of a VPN (Virtual Private Network) which is a secure closed network. One type of VPN has been provided by network providers for the purpose of cost reduction and assurance of security mainly to enterprises. At the same time, end user provided VPNs are also used. Here, the contents of data stored in a VPN are limited to a specific objective, which may cause less influence than the case where any kind of data is stored in en-bloc manner. Each VPN is managed by the service provider and has a different security policy that will bar other VPN from freely connecting to it. For instance, a user s medical data is stored in clinics and hospitals. Here, we assume there is medical information sharing platform and existence of VPN among medical centers. When a user would like to get its own medical information, it accesses the VPN remotely. To assure ubiquitous access, we assume to use mechanism proposed in section 2. And authenticity of the user is assured by the mechanism described in the section 4. The remote access to the VPN is realized by several kinds of VPN protocols such as IP-sec, PPTP, SoftEther and so on. A user-to-vpn connection can be established safely through the remote VPN access mechanism. In some case, however, information exchange between different VPNs shall be needed, for example, clinics in a clinical VPN must talk about the user s medicinal information with pharmacists in the medicinal VPN. Generally each VPN has its own security policy so that it is not permitted to directly communicate. We propose to establish a filtering mechanism at the user side that matches different policies. Details are for further study but the main concept is to establish a user-specific firewall between different VPNs. Each communication between any pair of VPNs regarding the specific user is made through the user-specific firewall. Through this mechanism, we believe to establish safe and secure personal data management and exchange. objective-specific VPNs for each user information VPN for objective-a VPN for objective-b VPN for objective-c policy matching user terminal Fig. 2 Objective-specific VPN

5 4. Data-Driven Networking Processor: CUE-v2 VLSI prototype named CUE-v2[6] has already been developed as a hardware platform by the authors. The CUE-v2 is a networking-oriented data-driven processor having following features. a) passive operational mode inherent in data-driven ready-to-fire principle; The CUE-v2 can realize highly-efficient response to events from outer world without any interrupt handlings. b) concurrent operating capability based on data-driven execution scheme; The CUE-v2 can naturally perform multiple processing without any context switching overheads. c) real-time multiple media processing capability without any control overheads by fully utilizing the above feature a) and b). In fact, data-driven realtime biometrics authentication system has been realized by previous version data-driven processor named CUE-v1 and the system demonstrated essentiality of continuous authentication scheme for secure networking architecture [7]. Furthermore, the CUE-v2 was realized as a hybrid processor enabling simultaneous processing of data-driven and control threads to give higher performance for inline processing and to avoid any bottlenecks in sequential part of real-time program frequently encountered in actual time-sensitive applications [8]. The authors therefore believe the CUE-v2 will be one of the most promising hardware platforms to study future secure information sharing networking infrastructure. Data driven packet router Fetch Decode Firing Control & Schedule Register Exec Exec Exec Exec IF0, IF1 : Instruction fetch ID0, ID1: Instruction Decode FC0, FC1, FC2 : Firing Control & schedul- Data driven path Control driven path Shared path Fig.3 Data-driven processor CUE-v2 5. Person-oriented ubiquitous and secure information sharing environment By combination of mechanisms proposed in sections above, we can establish a person-oriented ubiquitous and secure information sharing environment. The environment has two basic mechanisms and the underlying platform. One is the assurance of ubiquitous access to the computing and network resources encompassing digital content, network resources, computational resources, storage resources, and applications by virtue of right-token management. Users can select and use ubiquitous computing resources on demand under some

6 restriction such as the number of times a resource can be used or the length of time over which it can be used. Another is data management specific to a person by use of VPN. After getting computing resource through the mechanism above, user access its own data by remote access to the VPN specific to an objective. Harmonization of data related to multiple objectives can be achieved by the person specific policy matching filter. At the same time, we consider the adoption of data-driven processor as underlying hardware platform fitting to this environment. It enables realization of important hardware engines for the objectives such as bio-metrics authentication and multiple associations handlers for the processing bottleneck. management: Secure and ubiquitous resource access DDP engine Data-driven processor (DDP): Efficient processing and assurance of security in processor layer DDP gateway VPN VPN Objective-specific VPN Objective-specific VPN: management of personal information in the network Fig. 3 Basic concept proposed here 6. Conclusion We proposed a basic concept of person-oriented ubiquitous and secure information sharing environment. Combination of right-token management and objective-specific VPN realizes ubiquitous and secure information sharing platform. Underlying data-driven engine supports continuous bio-metrics authentication and settlement of processing bottleneck. We have just established the joint project to tackle realization of our basic proposal. We believe combination and harmonization of our three approaches will achieve new paradigm of secure and safe information sharing in ubiquitous manner.

7 References [1] B. Brumitt, B. Meyers, J. Krumm, A. Kern, and S. Shafer, EasyLiving: Technologies for intelligent environments, Proceedings of Handheld and Ubiquitous Computing, volume 1927 of Lecture Notes in Computer Science, pp , Bristol, UK, Sept [2] C. D. Kidd, R. J. Orr, G. D. Abowd, C. G. Atkeson, I. A. Essa, B. MacIntyre, E. Mynatt, T. E. Starner, and W. Newstetter, "The Aware Home: A living laboratory for ubiquitous computing research", Proceedings of the Second International Workshop on Cooperative Buildings, Integrating Information, Organization, and Architecture, pp , Pittsburgh, USA, Oct [3] J. E. Bardram, R. E. Kjaer, and M. Ø. Pedersen, Context-aware user authentication supporting proximity-based login in pervasive computing, Proceedings of the Fifth International Conference on Ubiquitous Computing, pp , Seattle, USA, Oct [4] Y. Tajima and H. Ishii, Distributed VPN Architecture for Purpose-Oriented Network, Proceeding of Multimedia, Distributed, Cooperative and Mobile Symposium (DICOMO) 2002, pp ,tokyo, July 2002 [5] J. Miyoshi and H. Ishii, "Network-based Single Sign-on Architecture for IP-VPN," Proc. of 2003 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM'03), pp , Victoria, Canada, Aug [6] S. Ito, R. Kurebayashi, H. Tomiyasu and H. Nishikawa, A Processor Architecture for Simultaneously Processing Dataflow and Control-flow Threads, Proceedings of the 15th IASTED International Conference on Parallel and Distributed Computing and Systems, pp (Nov. 2003). [7] Y. Wabiko, K. Aoki and H. Nishikawa, Data-Driven Realtime Biometrics Authentication for Secure Networking System, Proceedings of the 2004 International Conference on Parallel and Distributed Processing Techniques and Applications, pp (June 2004). [8] S. Ito, S. Nomoto, H. Tomiyasu and H. Nishikawa, The Microarchitecture of the CUE-v2 Processor: Enabling the Simultaneous Processing of Dataflow and Control-Flow Threads, Proceeding of the the 2004 International Conference on Parallel and Distributed Processing Techniques and Applications, pp (June 2004).

Efficient Network Control System

Efficient Network Control System Proposal of Applying ULP-DDNS to Congestion-Free Networking System Hideki YAMAUCHI Hiroaki NISHIKAWA Graduate School of Systems and Information Engineering, University of Tsukuba Tsukuba Science City,

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Highly-Dependable and Long-Lifetime Data-Driven Networking Processor with Energy Assurance Capability

Highly-Dependable and Long-Lifetime Data-Driven Networking Processor with Energy Assurance Capability Int'l Conf. Par. and Dist. Proc. Tech. and Appl. PDPTA'15 557 Highly-Dependable and Long-Lifetime Data-Driven Networking Processor with Energy Assurance Capability Shuji SANNOMIYA and Hiroaki NISHIKAWA

More information

A Smart Telephone Answering Machine with Voice Message Forwarding Capability

A Smart Telephone Answering Machine with Voice Message Forwarding Capability A Smart Telephone Answering Machine with Voice Message Forwarding Capability Chih-Hung Huang 1 Cheng Wen 2 Kuang-Chiung Chang 3 1 Department of Information Management, Lunghwa University of Science and

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Hospitals of the Future Ubiquitous Computing support for Medical Work in Hospitals

Hospitals of the Future Ubiquitous Computing support for Medical Work in Hospitals Hospitals of the Future Ubiquitous Computing support for Medical Work in Hospitals Jakob E. Bardram Centre for Pervasive Healthcare Department of Computer Science, University of Aarhus Aabogade 34, 8200

More information

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India kbchandradeep@gmail.com ABSTRACT This paper

More information

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies 3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

3 Software Defined Radio Technologies

3 Software Defined Radio Technologies 3 Software Defined Radio Technologies 3-1 Software Defined Radio for Next Generation Seamless Mobile Communication Systems In this paper, the configuration of the newly developed small-size software defined

More information

GR2000: a Gigabit Router for a Guaranteed Network

GR2000: a Gigabit Router for a Guaranteed Network Hitachi Review Vol. 48 (1999), No. 4 203 GR2000: a Gigabit Router for a Guaranteed Network Kazuo Sugai Yoshihito Sako Takeshi Aimoto OVERVIEW: Driven by the progress of the information society, corporate

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

The term Virtual Private Networks comes with a simple three-letter acronym VPN

The term Virtual Private Networks comes with a simple three-letter acronym VPN Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Network Security Infrastructure Testing

Network Security Infrastructure Testing Network Security Infrastructure Testing Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories Center for SCADA Security Project Lead Ray Parks Technical Lead Jason Hills Technical Support

More information

On Ubiquitous Network Security and Anomaly Detection *

On Ubiquitous Network Security and Anomaly Detection * On Ubiquitous Network Security and Anomaly Detection * Colin Van Dyke Çetin K. Koç Electrical & Computer Engineering Oregon State University {vandyke,koc}@ece.orst.edu Abstract As networking trends move

More information

On-Demand VPN Service between Home Networks for NGN Users

On-Demand VPN Service between Home Networks for NGN Users On-Demand VPN Service between Networks for NGN Users Tsuyoshi Abe, Shintaro Mizuno, Takahiro Haruyama, Hitomi Chiba, and Osamu Mizuno E-mail: sipdu@lab.ntt.co.jp NTT Information Sharing Platform Laboratories,

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

Intel DPDK Boosts Server Appliance Performance White Paper

Intel DPDK Boosts Server Appliance Performance White Paper Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

X.25 over IP. The Challenge. How it Works. Solution

X.25 over IP. The Challenge. How it Works. Solution over IP The Challenge Legacy services such as are still in use worldwide for a range of applications. Over the years, many customers have made significant investments in equipment and processes that depend

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger buc@kth.se Lecture 6, Nov. 10, 2010 Firewalls, Intrusion Prevention, Intrusion Detection

More information

Virtual PC-Type Thin Client System

Virtual PC-Type Thin Client System Thin Client Virtual PC-Type Thin Client System KAWASHIMA Hiroyuki, KOSHIBA Kunihiro, TUCHIMOCHI Kazuki, FUTAMURA Kazuhiro, ENOMOTO Masahiko, WATANABE Masahiro Abstract NEC has developed VirtualPCCenter,

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

Introduction of Information Security Research Division

Introduction of Information Security Research Division Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens Nick Marly, Dominique Chantrain, Jurgen Hofkens Alcatel Francis Wellesplein 1 B-2018 Antwerp Belgium Key Theme T3 Tel : (+32) 3 240 7767 Fax : (+32) 3 240 8485 E-mail : Nick.Marly@alcatel.be Tel : (+32)

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: aparnagulhane@gmail.com Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of

More information

Advanced Core Operating System (ACOS): Experience the Performance

Advanced Core Operating System (ACOS): Experience the Performance WHITE PAPER Advanced Core Operating System (ACOS): Experience the Performance Table of Contents Trends Affecting Application Networking...3 The Era of Multicore...3 Multicore System Design Challenges...3

More information

STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM

STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM Albert M. K. Cheng, Shaohong Fang Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

IMPLEMENTING AND SUPPORTING EXTRANETS

IMPLEMENTING AND SUPPORTING EXTRANETS 87-10-18 DATA SECURITY MANAGEMENT IMPLEMENTING AND SUPPORTING EXTRANETS Phillip Q. Maier INSIDE Extranet Architectures; Router-Based Extranet Architecture; Application Gateway Firewalls; Scalability; Multi-homed

More information

Terminal, Software Technologies

Terminal, Software Technologies What's Hot in R&D Terminal, Software Technologies Terminal technologies for ubiquitous services and software technologies related to solution businesses. Contents H-SW-1 H-SW-2 H-SW-3 H-SW-4 Professional

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

Introduction. Technology background

Introduction. Technology background White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course

More information

Secure Access Link. Table of Contents. Introduction. Background. avaya.com. Introduction... 1. Background... 1. Secure Access Link...

Secure Access Link. Table of Contents. Introduction. Background. avaya.com. Introduction... 1. Background... 1. Secure Access Link... Secure Access Link Table of Contents Introduction... 1 Background... 1 Secure Access Link... 2 Components... 3 Aggregated Traffic... 5 Flexible Authentication. and Authorization... 6 Complete Control over.

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4

More information

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks

An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,

More information

Firewall Architecture

Firewall Architecture NEXTEP Broadband White Paper Firewall Architecture Understanding the purpose of a firewall when connecting to ADSL network services. A Nextep Broadband White Paper June 2001 Firewall Architecture WHAT

More information

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Providing Secure IT Management & Partnering Solution for Bendigo South East College Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,

More information

SVN5800 Secure Access Gateway

SVN5800 Secure Access Gateway The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,

More information

Huawei Eudemon200E-N Next-Generation Firewall

Huawei Eudemon200E-N Next-Generation Firewall Huawei 200E-N Next-Generation Firewall With the popularity of mobile working using smartphones and tablets, mobile apps, Web2.0, and social networking become integral parts of works. This change in IT

More information

An SAML Based SSO Architecture for Secure Data Exchange between User and OSS

An SAML Based SSO Architecture for Secure Data Exchange between User and OSS An SAML Based SSO Architecture for Secure Data Exchange between User and OSS Myungsoo Kang 1, Choong Seon Hong 1,Hee Jung Koo 1, Gil Haeng Lee 2 1 Department of Computer Engineering, Kyung Hee University

More information

Development of the FITELnet-G20 Metro Edge Router

Development of the FITELnet-G20 Metro Edge Router Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing

More information

DESIGN OF A VIRTUAL COMPUTER SECURITY LAB

DESIGN OF A VIRTUAL COMPUTER SECURITY LAB DESIGN OF A VIRTUAL COMPUTER SECURITY LAB Jörg Keller and Ralf Naues LG Parallelität und VLSI FernUniversität in Hagen 58084 Hagen, Germany {joerg.keller,ralf.naues}@fernuni-hagen.de ABSTRACT We present

More information

P2P VoIP for Today s Premium Voice Service 1

P2P VoIP for Today s Premium Voice Service 1 1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com

More information

Network System Design Lesson Objectives

Network System Design Lesson Objectives Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

Design of Wireless Home automation and security system using PIC Microcontroller

Design of Wireless Home automation and security system using PIC Microcontroller IJCAES ISSN: 2231-4946 Volume III, Special Issue, August 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on National Conference on Information and Communication

More information

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring A White Paper from the Experts in Business-Critical Continuity TM Executive Summary With continued efforts to reduce overhead,

More information

Analysis on Virtualization Technologies in Cloud

Analysis on Virtualization Technologies in Cloud Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization

More information

BRC-W14VG-BT Wireless BitTorrent Download Router

BRC-W14VG-BT Wireless BitTorrent Download Router BRC-W14VG-BT Wireless BitTorrent Download Router BRC-W14VG-BT utilizes Intel (R) IXP network processor and achieves a high-speed WAN to LAN throughput that approaches 100Mbps. In addition to basic functions

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

Implementing SIP and H.323 Signalling as Web Services

Implementing SIP and H.323 Signalling as Web Services Implementing SIP and H.323 Signalling as Web Services Ge Zhang, Markus Hillenbrand University of Kaiserslautern, Department of Computer Science, Postfach 3049, 67653 Kaiserslautern, Germany {gezhang, hillenbr}@informatik.uni-kl.de

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

Multiple Layer Traffic Engineering in NTT Network Service

Multiple Layer Traffic Engineering in NTT Network Service Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service

More information

Embedded Parallel Computing

Embedded Parallel Computing Embedded Parallel Computing Lecture 5 - The anatomy of a modern multiprocessor, the multicore processors Tomas Nordström Course webpage:: Course responsible and examiner: Tomas

More information

Creating a VPN Using Windows 2003 Server and XP Professional

Creating a VPN Using Windows 2003 Server and XP Professional Creating a VPN Using Windows 2003 Server and XP Professional Recommended Instructor Preparation for Learning Activity Instructor Notes: There are two main types of VPNs: User-to-Network This type of VPN

More information

VoIP Solutions Guide Everything You Need to Know

VoIP Solutions Guide Everything You Need to Know VoIP Solutions Guide Everything You Need to Know Simplify, Save, Scale VoIP: The Next Generation Phone Service Ready to Adopt VoIP? 10 Things You Need to Know 1. What are my phone system options? Simplify,

More information

HI 3 Project: Design and Implementation of the Lower Level Layers

HI 3 Project: Design and Implementation of the Lower Level Layers HI 3 Project: Design and Implementation of the Lower Level Layers G. Varela, A. Paz-López, S. Vázquez-Rodríguez, R. J. Duro Integrated Group for Engineering Research Universidade da Coruña Spain Abstract

More information

A Cyber Laboratory for Device Dependent Hardware Experiments in a Hybrid Cloud

A Cyber Laboratory for Device Dependent Hardware Experiments in a Hybrid Cloud A Cyber Laboratory for Device Dependent Hardware Experiments in a Hybrid Cloud Nobuhiko Koike Faculty of Information and Computer Sciences, Hosei University, 3-7-2 Kajino-cho, Koganei-shi, 184-8584 Tokyo,

More information

Secure Document Circulation Using Web Services Technologies

Secure Document Circulation Using Web Services Technologies Secure Document Circulation Using Web Services Technologies Shane Bracher Bond University, Gold Coast QLD 4229, Australia Siemens AG (Corporate Technology), Otto-Hahn-Ring 6, 81739 Munich, Germany sbracher@student.bond.edu.au

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

High Speed Stateful Packet Inspection in Embedded Data-Driven Firewall

High Speed Stateful Packet Inspection in Embedded Data-Driven Firewall High Speed Stateful Packet Inspection in Embedded Data-Driven Firewall Ruhui Zhang*, Makoto Iwata*, Yuta Shirane*, Teruhisa Asahiyama*, Wenjun Su**, Youquan Zheng** *) Dept. of Information System Engineering,

More information

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile s Maria Koutsopoulou, Spyridon Panagiotakis, Athanassia Alonistioti, Alexandros

More information

ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing

ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing Jun Rekimoto, Takashi Miyaki, and Michimune Kohno Interaction Laboratory, Sony Computer Science Laboratories, Inc. 3-14-13 Higashigotanda,

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://ti.uni-due.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008 Standard)

More information

Expansion of Melody Call for Enhanced Music Services

Expansion of Melody Call for Enhanced Music Services Expansion of Melody Call for Enhanced Music Services Ringback Tones Audio Source Playback Music Content Special Articles on Technology toward Further Diversification of Life-Style Mobile Expansion of Melody

More information

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,

More information

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,

More information

BlackBerry Enterprise Solution and RSA SecurID

BlackBerry Enterprise Solution and RSA SecurID Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems

More information

Bus Data Acquisition and Remote Monitoring System Using Gsm & Can

Bus Data Acquisition and Remote Monitoring System Using Gsm & Can IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 8, Issue 3 (Nov. - Dec. 2013), PP 88-92 Bus Data Acquisition and Remote Monitoring System

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Windows 2000. NCD ThinPATH

Windows 2000. NCD ThinPATH O S E N V I R O N M E N T Thin Client Computing: Windows 2000 and NCD ThinPATH By Blaine Branchik Terminal Services is an integral part of Windows 2000 that, through server-based applications and centralized

More information

Cyber-Ark Software and the PCI Data Security Standard

Cyber-Ark Software and the PCI Data Security Standard Cyber-Ark Software and the PCI Data Security Standard INTER-BUSINESS VAULT (IBV) The PCI DSS Cyber-Ark s View The Payment Card Industry Data Security Standard (PCI DSS) defines security measures to protect

More information

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada ken@unb.ca Micaela Serra

More information

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Trusted Platforms for Homeland Security

Trusted Platforms for Homeland Security Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business

More information

Network Mobility Support Scheme on PMIPv6 Networks

Network Mobility Support Scheme on PMIPv6 Networks Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr

More information

Design Issues in a Bare PC Web Server

Design Issues in a Bare PC Web Server Design Issues in a Bare PC Web Server Long He, Ramesh K. Karne, Alexander L. Wijesinha, Sandeep Girumala, and Gholam H. Khaksari Department of Computer & Information Sciences, Towson University, 78 York

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering Sixth Semester Subject: Network Security & Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents

More information