Statements (92)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:standard
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:802.1_standards_family
|
gptkbp:applies_to |
local area networks (LA Ns)
LA Ns |
gptkbp:defines |
security associations
MAC Security (MA Csec) |
gptkbp:developed_by |
gptkb:standard
gptkb:API |
gptkbp:enables |
secure communication
secure network access |
gptkbp:facilitates |
secure communications in data centers
|
gptkbp:first_published |
gptkb:2006
|
https://www.w3.org/2000/01/rdf-schema#label |
802.1 AE
|
gptkbp:is_adopted_by |
gptkb:Educational_Institution
government agencies various industries telecommunications industry enterprise networks |
gptkbp:is_compatible_with |
gptkb:standard
802.1 QVLAN tagging |
gptkbp:is_designed_to |
prevent eavesdropping
prevent tampering ensure data authenticity |
gptkbp:is_evaluated_by |
security assessments
industry standards organizations |
gptkbp:is_implemented_in |
gptkb:software
gptkb:computer network switches routers Ethernet switches network interface cards (NI Cs) |
gptkbp:is_influenced_by |
cryptography advancements
|
gptkbp:is_part_of |
gptkb:software
gptkb:IEEE_802.1_standards risk management strategies compliance frameworks data protection strategies secure communication protocols network access control solutions IEEE 802 family of standards secure network design MA Csec protocol suite |
gptkbp:is_related_to |
gptkb:standard
access control data loss prevention encryption standards network security data protection regulations network segmentation network security protocols |
gptkbp:is_standardized_by |
gptkb:software
secure Ethernet |
gptkbp:is_supported_by |
security protocols
various vendors network management tools intrusion detection systems firewalls network equipment manufacturers network operating systems |
gptkbp:is_used_for |
protecting sensitive data
preventing eavesdropping ensuring data authenticity preventing data tampering |
gptkbp:is_used_in |
gptkb:Educational_Institution
data centers cloud computing environments enterprise networks virtualized environments healthcare networks government networks Io T networks |
gptkbp:name |
MA Csec
|
gptkbp:operates_under |
gptkb:Data_Link_Layer
data link layer |
gptkbp:provides |
data integrity
data confidentiality origin authentication data origin authentication per-packet authentication per-packet encryption |
gptkbp:published_by |
gptkb:2006
|
gptkbp:purpose |
providing secure communication over Ethernet
|
gptkbp:related_to |
gptkb:standard
|
gptkbp:requires |
key management protocol
|
gptkbp:specifies |
frame format for secure communication
MA Csec Key Agreement Protocol (MKA) |
gptkbp:successor |
802.1 A Ebn
|
gptkbp:supports |
Ethernet networks
multiple encryption algorithms |
gptkbp:uses |
encryption
Galois/ Counter Mode (GCM) |