Statements (60)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:standard
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:IEEE_802.1_Working_Group
gptkb:IEEE_802.1_standards |
gptkbp:addresses |
network security
|
gptkbp:applies_to |
Ethernet networks
local area networks (LA Ns) |
gptkbp:defines |
gptkb:software
IEEE 802.1 AE-2006 IEEE 802.1 AE-2018 |
gptkbp:developed_by |
gptkb:API
|
gptkbp:enables |
secure communication
|
https://www.w3.org/2000/01/rdf-schema#label |
IEEE 802.1 AE
|
gptkbp:includes |
key management
key management protocols |
gptkbp:is_adopted_by |
gptkb:Educational_Institution
government agencies telecommunications industry |
gptkbp:is_compatible_with |
gptkb:standard
|
gptkbp:is_implemented_in |
network switches
network routers |
gptkbp:is_part_of |
gptkb:IEEE_802_family
gptkb:IEEE_802.1_standards network security protocols IEEE 802.1 Q standards IEEE 802.1 X standards |
gptkbp:is_protected_by |
man-in-the-middle attacks
eavesdropping |
gptkbp:is_related_to |
gptkb:standard
data loss prevention encryption standards identity management network segmentation data protection standards network access control |
gptkbp:is_standardized_by |
gptkb:Institute_of_Electrical_and_Electronics_Engineers_(IEEE)
secure Ethernet |
gptkbp:is_supported_by |
various vendors
intrusion detection systems firewalls network security appliances IEEE 802.1 AE-2018 |
gptkbp:is_used_by |
data centers
enterprise networks |
gptkbp:is_used_for |
protecting data in transit
|
gptkbp:is_used_in |
secure communications
cloud computing environments virtualized networks |
gptkbp:operates_under |
gptkb:Data_Link_Layer
data link layer |
gptkbp:provides |
data integrity
data confidentiality origin authentication |
gptkbp:published_by |
gptkb:2004
|
gptkbp:specifies |
MA Csec
MAC Security (MA Csec) |
gptkbp:supports |
Ethernet networks
point-to-point connections point-to-multipoint connections |
gptkbp:uses |
encryption
|