The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Compared with the traditional stiff and decentralized security mechanisms, software-defined security SDS provides a flexible and centralized solution through extract security strategy from the hardware to the software. A variety of software-defined security architecture has been proposed, basically like SDN three layer, let the control layer separate from the data layer. Now, however, these software-defined...
In the last two years, ETSI's NFV Management and Orchestration working group has defined the NFV reference architecture. Network Function Virtualization (NFV) intends to decouple the network function from dedicated network appliance through virtualization technologies. As security is an important issue in the context of NFV environments, but the ETSI NFV architecture didn't involve much about security...
Multicast communication is an important requirement for many types of applications such as IPTV, video conference. In current IP multicast architecture, any host can join a multicast group without authentication because no host identification information is maintained by routers, which leads to security risks. In addition, the routers need to be involved in both forwarding packets and maintaining...
The development of the mobile Internet brought about by the thriving mobile intelligent terminals has made it possible to access to the Internet anytime and anywhere. While people enjoy the convenience, they also suffer from a series of security threats caused by cyber-attacks. IPS brings reliability and security in a network system and is regarded as one of the most popular security devices. However,...
In recent years,government,enterprise and bank network have become highly dependent on Internet.The drawback of this situation is that the consequences of disturbances of the underlying Internet may be serious as cascading effects can occur.This raised a high demand for security assurance.In order to impoving security,every year,they spend a lot of money to buy security products,with a high importance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.