Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10341842 | Information Security Technical Report | 2005 | 8 Pages |
Abstract
There are many articles explaining why it is necessary to limit access to sensitive resources that are exposed to traffic originating from untrusted users and networks. Generally, such articles will also describe generic security solutions that address these issues. In this article we go one step further and describe the installation of security technology designed to protect extranet web pages and Web Services of a telecommunications company. We give a brief overview of the PEP-PDP architecture described in RFC 2753 which provides a reference model for the products used in the deployment.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Allan MacPhee, Mark O'Neill,