Cloud based inspection of secure content avoiding man-in-the-middle attacks

作者: Jose Raphel , Narinder Paul , Sivaprasad Udupa , Kailash Kailash

DOI:

关键词:

摘要: A cloud based system that facilitates inspection of secure content and inexpensively detects the presence a Man-in-the-Middle attack in client-server communication is disclosed. Through server certificate, no between ensured; through designation client absence ensured. In this way, can perform its usual policy enforcement functions with respect to while avoiding attacks.

参考文章(11)
Ichiro Futamura, Masashi Kon, Yoshihito Ishibashi, Shinako Matsuyama, Hideaki Watanabe, Public-key-encryption data-communication system and data-communication-system forming method ,(2001)
Brad B. Topol, Marcia L. Peters, John R. Hind, Mark C. Davis, Selective data encryption using style sheet processing ,(1999)
Paul F. Rieth, Thomas E. Murphy, Jeffrey S. Stevens, Don R. Gillespie, System and method for network log-on by associating legacy profiles with user certificates ,(2000)
Marc E. Seinfeld, Donald J. Kadyk, Neil S. Fishman, Michael Kramer, Negotiating secure connections through a proxy server ,(2002)
Vijaya Bharathi Kaza, Anupama Sundaresan, Jianxin Wang, Dario Calia, Transparent proxy of encrypted sessions ,(2006)
Pelin Angin, Bharat Bhargava, Rohit Ranchal, Noopur Singh, Mark Linderman, Lotfi Ben Othmane, Leszek Lilien, An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing symposium on reliable distributed systems. pp. 177- 183 ,(2010) , 10.1109/SRDS.2010.28
Kobi O. Eshun, Donald W. Mahurin, Method and apparatus for thwarting spyware ,(2007)