Securing Communication over a Network Using Dynamically Assigned Proxy Servers

作者: Ted Schroeder , Junaid Islam , Brent Bilger

DOI:

关键词:

摘要: The various embodiments described herein include methods, devices, and systems for providing secure access to network resources. In one aspect, a method is performed at trust broker system. includes: (1) receiving, from client system, request applications resources hosted by server system; (2) identifying domain the requested resources; (3) determining whether system authorized domain; (4) particular containing (5) proxy assigned server; (6) in accordance with determination that domain: (a) transmitting an identification value identified (b) after server, transmitting, contact information connecting server.

参考文章(141)
Lars Kuhtz, Gitika Aggarwal Saubhasik, Sumalatha Adabala, Andrey Shur, Michael Entin, Irina Gorbach, Michael Ray Clark, Roy Peter D'Souza, Dmitry Denisov, Venkatesh Krishnan, Trust services for securing data in the cloud ,(2012)
Ravi Ganesan, Todd Wolff, Safemashups cloud trust broker ,(2010)
David M. Bleckmann, Christopher T. Smith, System and method for identifying installed software products ,(2012)
Guruparan Chandrasekaran, System and method of enforcing a computer policy ,(2011)
Michael Paolini, Rabindranath Dutta, Michael Brown, Editing messaging sessions for a record ,(2001)
Eugene T. Bond, Adam J. Thompson, Gandolf G. Hudlow, Cloud based virtual environment validation ,(2012)