Skip to main content

Computer Network Security Protocols

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 3136 Accesses

Abstract

The rapid growth of the Internet and corresponding Internet communities have fueled a rapid growth of both individual and business communications leading to the growth of e-mail and e-commerce. In fact, studies now show that the majority of the Internet communication content is e-mail content. The direct result of this has been the growing concern and sometimes demand for security and privacy in electronic communication and e-commerce. Security and privacy are essential if individual communication is to continue and e-commerce is to thrive in cyberspace. The call and desire for security and privacy have led to the advent of several proposals for security protocols and standards. Among these are Secure Socket Layer (SSL) and Transport Layer Security (TLS) Protocols, secure IP (IPSec), Secure HTTP (S-HTTP), secure e-mail (PGP and S/MIME), DNDSEC, SSH, and others. Before we proceed with the discussion of these and others, we want to warn the reader of the need for a firm understanding of the network protocol stack; otherwise go back and look over the material in Chap. 1 before continuing. We will discuss these protocols and standards within the framework of the network protocol stack as follows.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Stallings W (1999) Cryptography and network security: principles and practice, 2nd edn. Prentice Hall, Upper Saddle River

    Google Scholar 

  2. Shostack A (1995) An overview of S-HTTP. http://www.homeport.org/~adam/shttp.html

  3. Jasma K (2002) Hacker proof: the ultimate guide to network security, 2nd edn. OnWord Press, Albany

    Google Scholar 

  4. Stein L (1998) Web security: a step-by-step reference guide. Addison-Wesley, Reading

    Google Scholar 

  5. Tung B (1996) The Moron’s guide to Kerberos, version 1.2.2. http://www.isi.edu/~brian/security/kerberos.html

  6. Onyszko T (2002) Secure socket layer: authentication, access control and encryption. WindowSecurity.com. http://www.windowsecurity.com/articles/Secure_Socket_Layer.html

  7. Allen Jones, SSL Demystified: the SSL encryption method in IIS. http://www.windowswebsolutions.com/Articles/Index.cfm?ArticleID = 16047

  8. Kurose J, Keith WR (2003) Computer networking: a top-down approach featuring the Internet. Addison-Wesley, Reading

    Google Scholar 

  9. Black U (2000) Internet security protocols: protecting IP traffic. Prentice Hall, Upper Saddle River

    Google Scholar 

  10. Hoden G (2004) Guide to firewalls and network security: intrusion detection and VPNs. Thomson Delmar Learning, Clifton Park

    Google Scholar 

  11. VPN Consortium, VPN technologies: definitions are requirements, January 2003. http://vpnc.org

  12. Panko R (2004) Corporate computer and network security. Prentice Hall, Upper Saddle River

    Google Scholar 

  13. Radius. http://www.gnu.org/software/radius/radius.html#TOCintroduction

  14. RFC 2138. http://www.faqs.org/rfcs/rfc2138.html

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2015). Computer Network Security Protocols. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6654-2_17

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6653-5

  • Online ISBN: 978-1-4471-6654-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics