Date Added: Jan 2011
Due to the sensitive nature of information transmitted during a policy deployment, the communication between management tool and firewall should be confidential. Confidentiality can be achieved by using encrypted communication protocols such as SSH, SSL and IPSec. Much research has already addressed the specification of policies, conflict detection and optimization, but very little research is devoted to the security of policy deployment. In the previous paper, the authors proposed an exact algorithm for the deployment of security policies but in this paper, they will propose an effective solution that will allow one to secure the deployment process of a political target. This solution has the objective to create secure tunnels between the different entities (firewalls).