Internet/Intranet firewall security - policy, architecture and transaction services

The development of Internet/Intranet security is of paramount importance to organisations that plan to gain the economic benefits from interconnection with the Internet. This paper commences by examining firewall policy, focusing on both network service access policy and firewall design policy. Various firewall architectures, ranging from simple packet filters through to screened subnets and proxy gateways, are then discussed. Finally, the various mechanisms by which transactions can be secured over the Internet/Intranet are covered. These include encrypted tunnelling, IPv6, point-to-point tunnelling protocol, secure sockets layer, secure electronic transactions and secure multipart Internet mail encoding.

[1]  Chris Hare,et al.  Internet firewalls and network security , 1996 .

[2]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[3]  Udo W. Pooch,et al.  Computer system and network security , 1995 .

[4]  Elizabeth D. Zwicky,et al.  Building internet firewalls , 1995 .

[5]  S.M. Bellovin,et al.  Network firewalls , 1994, IEEE Communications Magazine.

[6]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.