
The creation of a network for an organization or a firm can be a multifarious task especially if there a large number of nodes, middle-boxes and security nodes to be integrated in the network. This paper introduces the integration of the ABE algorithm into a virtual network security called the NETSECVISOR in order to achieve authentication of the users involved in the network and the confidentiality of data transmitted or received. A virtual network redeems the administrators and network designers from its complexity not only by reducing the number of devices required, to a specific workstation that will take as input the various policies pertaining to the packets to be sent but also by including various routing rules and response techniques for malicious attacks. The Attribute Based Encryption (ABE) algorithm is used to improve the security on an existing virtual network security called the NETSECVISOR. The ABE algorithm uses attributes that are known to the participants involved in the transmission and reception of packets. This helps ease the process of creation and retrieval of keys for encryption and decryption notwithstanding the performance of security that will be enhanced for the virtual network.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
