| dc.contributor.author | Naous, Jad | |
| dc.contributor.author | Stutsman, Ryan | |
| dc.contributor.author | Mazieres, David | |
| dc.contributor.author | McKeown, Nick | |
| dc.contributor.author | Zeldovich, Nickolai | |
| dc.date.accessioned | 2011-11-10T16:31:07Z | |
| dc.date.available | 2011-11-10T16:31:07Z | |
| dc.date.issued | 2009-08 | |
| dc.identifier.isbn | 9781605584430 | |
| dc.identifier.uri | http://hdl.handle.net/1721.1/67004 | |
| dc.description.abstract | Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be able to cope, the administrator needs to delegate some control back to end-hosts and users, a capability that is missing in today's networks. Delegation makes administrators less of a bottleneck when policy needs to be modified and allows network administration to follow organizational lines. To enable delegation, we propose ident++ - a simple protocol to request additional information from end-hosts and networks on the path of a flow. ident++ allows users and end-hosts to participate in network security enforcement by providing information that the administrator might not have or rules to be enforced on their behalf. In this paper we describe ident++ and how it provides delegation and enables flexible and powerful policies. | en_US |
| dc.description.sponsorship | United States. Dept. of Homeland Security (Scholarship and Fellowship Program) | en_US |
| dc.description.sponsorship | United States. Dept. of Energy | en_US |
| dc.description.sponsorship | Oak Ridge Institute for Science and Education | en_US |
| dc.language.iso | en_US | |
| dc.publisher | Association for Computing Machinery | en_US |
| dc.relation.isversionof | http://dx.doi.org/10.1145/1592681.1592685 | en_US |
| dc.rights | Creative Commons Attribution-Noncommercial-Share Alike 3.0 | en_US |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
| dc.source | MIT web domain | en_US |
| dc.title | Delegating Network Security with More Information | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Naous, Jad et al. “Delegating network security with more information.” in WREN '09, Proceedings of the 1st ACM workshop on Research on enterprise networking, August 21, 2009, Barcelona, Spain, ACM Press. | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
| dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
| dc.contributor.approver | Zeldovich, Nickolai | |
| dc.contributor.mitauthor | Zeldovich, Nickolai | |
| dc.relation.journal | Proceedings of the 1st ACM Workshop on Research on Enterprise Networking, WREN '09 | en_US |
| dc.eprint.version | Author's final manuscript | en_US |
| dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
| dspace.orderedauthors | Naous, Jad; Stutsman, Ryan; Mazieres, David; McKeown, Nick; Zeldovich, Nickolai | en |
| dc.identifier.orcid | https://orcid.org/0000-0003-0238-2703 | |
| mit.license | OPEN_ACCESS_POLICY | en_US |
| mit.metadata.status | Complete | |