Abstract
The rapid growth of the Internet and corresponding Internet communities have fueled a rapid growth of both individual and business communications leading to the growth of e-mail and e-commerce. In fact, studies now show that the majority of the Internet communication content is e-mail content. The direct result of this has been the growing concern and sometimes demand for security and privacy in electronic communication and e-commerce. Security and privacy are essential if individual communication is to continue and e-commerce is to thrive in cyberspace. The call and desire for security and privacy have led to the advent of several proposals for security protocols and standards. Among these are Secure Socket Layer (SSL) and Transport Layer Security (TLS) Protocols, secure IP (IPSec), Secure HTTP (S-HTTP), secure e-mail (PGP and S/MIME), DNDSEC, SSH, and others. Before we proceed with the discussion of these and others, we want to warn the reader of the need for a firm understanding of the network protocol stack; otherwise go back and look over the material in Chap. 1 before continuing. We will discuss these protocols and standards within the framework of the network protocol stack as follows.
References
Stallings W (1999) Cryptography and network security: principles and practice, 2nd edn. Prentice Hall, Upper Saddle River
Shostack A (1995) An overview of S-HTTP. http://www.homeport.org/~adam/shttp.html
Jasma K (2002) Hacker proof: the ultimate guide to network security, 2nd edn. OnWord Press, Albany
Stein L (1998) Web security: a step-by-step reference guide. Addison-Wesley, Reading
Tung B (1996) The Moron’s guide to Kerberos, version 1.2.2. http://www.isi.edu/~brian/security/kerberos.html
Onyszko T (2002) Secure socket layer: authentication, access control and encryption. WindowSecurity.com. http://www.windowsecurity.com/articles/Secure_Socket_Layer.html
Allen Jones, SSL Demystified: the SSL encryption method in IIS. http://www.windowswebsolutions.com/Articles/Index.cfm?ArticleID = 16047
Kurose J, Keith WR (2003) Computer networking: a top-down approach featuring the Internet. Addison-Wesley, Reading
Black U (2000) Internet security protocols: protecting IP traffic. Prentice Hall, Upper Saddle River
Hoden G (2004) Guide to firewalls and network security: intrusion detection and VPNs. Thomson Delmar Learning, Clifton Park
VPN Consortium, VPN technologies: definitions are requirements, January 2003. http://vpnc.org
Panko R (2004) Corporate computer and network security. Prentice Hall, Upper Saddle River
Radius. http://www.gnu.org/software/radius/radius.html#TOCintroduction
RFC 2138. http://www.faqs.org/rfcs/rfc2138.html
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2015). Computer Network Security Protocols. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_17
Download citation
DOI: https://doi.org/10.1007/978-1-4471-6654-2_17
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-6653-5
Online ISBN: 978-1-4471-6654-2
eBook Packages: Computer ScienceComputer Science (R0)