Article ID Journal Published Year Pages File Type
10341842 Information Security Technical Report 2005 8 Pages PDF
Abstract
There are many articles explaining why it is necessary to limit access to sensitive resources that are exposed to traffic originating from untrusted users and networks. Generally, such articles will also describe generic security solutions that address these issues. In this article we go one step further and describe the installation of security technology designed to protect extranet web pages and Web Services of a telecommunications company. We give a brief overview of the PEP-PDP architecture described in RFC 2753 which provides a reference model for the products used in the deployment.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,