lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
This paper describes the scenario in the transition oflpv4 to lpv6 with focusing on the security issues involved in each of the transition methods: dual stack and tunneling. Then, the paper analyze the existing security mechanisms available and identify new considerations for a new security model.
Saved in:
Main Authors: | Hj Mat Taib, Abidah, Budiarto, Rahmat, Samsudin, Azman |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2007
|
Subjects: | |
Online Access: | http://eprints.usm.my/9447/1/IPv6_Transition_-_Why_a_new_security_mechanisms_model_is_necessary.pdf http://eprints.usm.my/9447/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007) -
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004) -
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009) -
Selecting A Cyclic Redundancy Check (CRC) Generator Polynomial for CEH (CRC Extension Header).
by: Supriyanto, Supriyanto, et al.
Published: (2009) -
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)