Access Policy Transfer Between Active Nodes Using Identities

  • Kim, Young-Soo (Network Security Department, Information Security Technology Division, ETRI) ;
  • Han, Jong-Wook (Network Security Department, Information Security Technology Division, ETRI) ;
  • Seo, Dong-Il (Network Security Department, Information Security Technology Division, ETRI) ;
  • Sohn, Seung-Won (Network Security Department, Information Security Technology Division, ETRI)
  • Published : 2003.10.22

Abstract

Active networks allow active node’s functionality to be extended dynamically through the use of active extensions. This flexible architecture facilitates the deployment of new network protocols and services. However, the active nature of a network also raises serious safety and security concerns. These concerns must be addressed before active networks can be deployed. In this paper we look at how we can control active extension’s access to different active nodes. Specifically, the authentication between active nodes is very important in this case. We use unique identity each node has for transferring access policies between active nodes. In this paper, we suggest a new method of transferring access policies performing authentications using identities between active nodes.

Keywords