Design Alternatives for Computer Network Security, Volume 1; Volume 13The Bureau, 1978 - 159 pages |
From inside the book
Results 1-5 of 28
Page 1
... adding a new dimension to the security problem due to the multi - user environment . As software and data base resources began to grow in size and value , the need to share these resources also became evident , and added another ...
... adding a new dimension to the security problem due to the multi - user environment . As software and data base resources began to grow in size and value , the need to share these resources also became evident , and added another ...
Page 20
... added com- plexity has no apparent benefit , the scheme will not be considered further , and only the first method ( checks at the resource SC ) will be considered in subsequent sections . 2.2.3 Composite Authorizations Several entities ...
... added com- plexity has no apparent benefit , the scheme will not be considered further , and only the first method ( checks at the resource SC ) will be considered in subsequent sections . 2.2.3 Composite Authorizations Several entities ...
Page 28
... back and forth between data and control interpretations of given bit patterns ( DAV - 73 ) . The added complications of encryption are due to the need 28238 3 Degradation Due to Security Mechanisms 4 Separation of Data and Control 3.
... back and forth between data and control interpretations of given bit patterns ( DAV - 73 ) . The added complications of encryption are due to the need 28238 3 Degradation Due to Security Mechanisms 4 Separation of Data and Control 3.
Page 29
Gerald D. Cole, Dennis K. Branstad. The added complications of encryption are due to the need to pass clear- text control information through ( or around ) the device to provide addressing information , etc. that the communications net ...
Gerald D. Cole, Dennis K. Branstad. The added complications of encryption are due to the need to pass clear- text control information through ( or around ) the device to provide addressing information , etc. that the communications net ...
Page 40
... added a new HOST - level entity called the Security Con- troller ( SC ) , which will mechanize those third - party control functions described in the earlier requirements section . Since our concern is primarily with net- work security ...
... added a new HOST - level entity called the Security Con- troller ( SC ) , which will mechanize those third - party control functions described in the earlier requirements section . Since our concern is primarily with net- work security ...
Common terms and phrases
access authorization access control access control matrix access group additional addressing approach aspects audit information basic buffer capabilities checking clear text communications net communications network communications path connection creation considered control commands control information control messages crypto cryptographic devices data and control Data Encryption Standard data processing dialog distributed domain enciphered encipherment encryption devices ensure entities error control fail-secure functions gateway handled HOST computers HOST-level HOST's ICD's identification/authentication implicit initial interface involved issues matrix methods mini-HOST mode multiplexed N-th party accesses N-th party authentication network control programs Network Security Center node object one-time passwords operation pair passwords performed physical and procedural possible private key problems procedural controls processor profile information protection protocol Reference Monitor relay request requestor requirements resource SC-to-SC SC's scheme security control mechanism separate sequence numbers server structure structured programming terminal tradeoffs updates usage utilized
Popular passages
Page iv - In no case does such identification imply recommendation or endorsement by the National Bureau of Standards...