International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 123

Research Paper | Information Technology | India | Volume 4 Issue 4, April 2015

Secure Package Manager for UTM

Tom K Sunny, Beatrice Ssowmiya J

Unified threat management system (UTM) is an integration of stand alone security products such as Firewall, IDS, Proxy, Antivirus etc. The proposed paper is for implementing a package management system for the UTM. Whenever a update is available for the different modules in UTM such as, an update released for antivirus or Firewall or IDS the package management system can be used for the update. The problem with the current system is the updates have to be installed manually by the user for every UTM implemented. The proposed system uses linux-s advanced packaging tool for managing the PACKAGE update, removal, etc. Additional modules are added for checking the integrity of the packages.

Keywords: Package, Encryption, Hashing, Package Management System

Edition: Volume 4 Issue 4, April 2015

Pages: 1651 - 1653

Share this Article

How to Cite this Article?

Tom K Sunny, Beatrice Ssowmiya J, "Secure Package Manager for UTM", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153458, Volume 4 Issue 4, April 2015, 1651 - 1653

Enter Your Email Address


Similar Articles with Keyword 'Package'

Downloads: 105

Research Proposals or Synopsis, Information Technology, Namibia, Volume 6 Issue 11, November 2017

Pages: 1316 - 1321

Investigating the Use of Social Media as a Learning and Teaching Tool in Higher Education Institutions of Namibia

Ndasilwohenda Tuyenikelago Ndilinawa, Nomusa Dlodlo, Jude Osakwe

Share this Article

Downloads: 108

Research Paper, Information Technology, Nigeria, Volume 4 Issue 11, November 2015

Pages: 878 - 884

Instructional Design Quality: An Evaluation of Open Education Europa Networks? Open Courses using the First Principles of Instruction

Emeka Joshua Chukwuemeka, Andrew Obida Yoila, Ersun Iscioglu

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Similar Articles with Keyword 'Hashing'

Downloads: 112

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2430 - 2432

Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform

Rishi Kumar Gupta, G. Sujatha

Share this Article

Downloads: 116

Survey Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 1570 - 1572

Survey on: Query Services in Cloud Security

Sapana S. Vasave, Dr. Kishor R. Kolhe

Share this Article
Top