lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
This paper describes the scenario in the transition oflpv4 to lpv6 with focusing on the security issues involved in each of the transition methods: dual stack and tunneling. Then, the paper analyze the existing security mechanisms available and identify new considerations for a new security model.
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | en |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/9447/1/IPv6_Transition_-_Why_a_new_security_mechanisms_model_is_necessary.pdf http://eprints.usm.my/9447/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1834437037374046208 |
|---|---|
| author | Hj Mat Taib, Abidah Budiarto, Rahmat Samsudin, Azman |
| author_facet | Hj Mat Taib, Abidah Budiarto, Rahmat Samsudin, Azman |
| author_sort | Hj Mat Taib, Abidah |
| building | Hamzah Sendut Library |
| collection | Institutional Repository |
| content_provider | Universiti Sains Malaysia |
| content_source | USM Institutional Repository |
| continent | Asia |
| country | Malaysia |
| description | This paper describes the scenario in the transition oflpv4 to lpv6 with focusing on the security issues involved in each of the transition methods: dual stack and tunneling. Then, the paper analyze the existing security mechanisms available and identify new considerations for a new security model.
|
| format | Conference or Workshop Item |
| id | my.usm.eprints.9447 |
| institution | Universiti Sains Malaysia |
| language | en |
| publishDate | 2007 |
| record_format | eprints |
| spelling | my.usm.eprints.9447 http://eprints.usm.my/9447/ lPv6 Transition: Why A New Security Mechanisms Model Is Necessary. Hj Mat Taib, Abidah Budiarto, Rahmat Samsudin, Azman QA75.5-76.95 Electronic computers. Computer science This paper describes the scenario in the transition oflpv4 to lpv6 with focusing on the security issues involved in each of the transition methods: dual stack and tunneling. Then, the paper analyze the existing security mechanisms available and identify new considerations for a new security model. 2007-08 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.usm.my/9447/1/IPv6_Transition_-_Why_a_new_security_mechanisms_model_is_necessary.pdf Hj Mat Taib, Abidah and Budiarto, Rahmat and Samsudin, Azman (2007) lPv6 Transition: Why A New Security Mechanisms Model Is Necessary. In: APAN Research Workshop 2007, 27-31 August 2007, X’ian, China. |
| spellingShingle | QA75.5-76.95 Electronic computers. Computer science Hj Mat Taib, Abidah Budiarto, Rahmat Samsudin, Azman lPv6 Transition: Why A New Security Mechanisms Model Is Necessary. |
| title | lPv6 Transition: Why A New Security Mechanisms Model Is Necessary. |
| title_full | lPv6 Transition: Why A New Security Mechanisms Model Is Necessary. |
| title_fullStr | lPv6 Transition: Why A New Security Mechanisms Model Is Necessary. |
| title_full_unstemmed | lPv6 Transition: Why A New Security Mechanisms Model Is Necessary. |
| title_short | lPv6 Transition: Why A New Security Mechanisms Model Is Necessary. |
| title_sort | lpv6 transition: why a new security mechanisms model is necessary. |
| topic | QA75.5-76.95 Electronic computers. Computer science |
| url | http://eprints.usm.my/9447/1/IPv6_Transition_-_Why_a_new_security_mechanisms_model_is_necessary.pdf http://eprints.usm.my/9447/ |
| url_provider | http://eprints.usm.my/ |
