Design Alternatives for Computer Network Security, Volume 1; Volume 13 |
What people are saying - Write a review
We haven't found any reviews in the usual places.
Common terms and phrases
access control added additional addressing allowed applied approach appropriate areas aspects assume attempt audit authentication authorization basic become block buffer centralized changes checking clear combination commands communications complete concern connection considerations considered creation cryptographic devices defined dependent detect determine device dialog direct discussed distributed effect encryption ensure entities equipment error established example factors Figure functions given handled HOST indicated initial interface involved issues least manner means mechanisms methods mode multiplexed N-th party namely necessary network security object operation particular path performed person physical possible problems processor protection protocol relay request requestor requirements resource sc's scheme Security Controller security mechanisms selected sent separate sequence structure terminal typically updates usage utilized
Popular passages
Page iv - In no case does such identification imply recommendation or endorsement by the National Bureau of Standards...