ISSE is a kind of methodology in information system security designing and security management. In thispaper,we first give simple discussions of the main steps and basic functions of ISSE,then we take a large scale ne...ISSE is a kind of methodology in information system security designing and security management. In thispaper,we first give simple discussions of the main steps and basic functions of ISSE,then we take a large scale net-work security system as an example to discuss how to use ISSE,and finally,we point out the importance of ISSE indesigning security system and in security management.展开更多
PKI and IPSec are the widely used technologies in today's information security area. In this paper ,PKI andIPSec are discussed briefly at first. Then two methods of combining PKI with IPSec are proposed with detai...PKI and IPSec are the widely used technologies in today's information security area. In this paper ,PKI andIPSec are discussed briefly at first. Then two methods of combining PKI with IPSec are proposed with details,andhow to use PKI in IPSec configuration management is also discussed. Finally,it points out that identity of IPSec com-munication entity may be the special user but not limited to IP address with PKI. It also points out that PKI makes a-thentication of IPSec entity more secure and reliable,and makes IPSec configurations more flexible.展开更多
文摘ISSE is a kind of methodology in information system security designing and security management. In thispaper,we first give simple discussions of the main steps and basic functions of ISSE,then we take a large scale net-work security system as an example to discuss how to use ISSE,and finally,we point out the importance of ISSE indesigning security system and in security management.
文摘PKI and IPSec are the widely used technologies in today's information security area. In this paper ,PKI andIPSec are discussed briefly at first. Then two methods of combining PKI with IPSec are proposed with details,andhow to use PKI in IPSec configuration management is also discussed. Finally,it points out that identity of IPSec com-munication entity may be the special user but not limited to IP address with PKI. It also points out that PKI makes a-thentication of IPSec entity more secure and reliable,and makes IPSec configurations more flexible.