Design Alternatives for Computer Network Security, Volume 1; Volume 13The Bureau, 1978 - 159 pages |
From inside the book
Results 1-5 of 8
Page 83
... buffers . Table - driven to minimize program changes . * Two - person reviews of changes . The following paragraphs discuss these aspects as they relate to the SC program , while addressing the aspects of its basic functional and ...
... buffers . Table - driven to minimize program changes . * Two - person reviews of changes . The following paragraphs discuss these aspects as they relate to the SC program , while addressing the aspects of its basic functional and ...
Page 86
... buffers to the control block , or ( 2 ) preassigning buffer space to each block . Due to the similar nature of all requestor - SC dialogs , there does not appear to be any need for the dynamic linking of buffers , and hence the buffer ...
... buffers to the control block , or ( 2 ) preassigning buffer space to each block . Due to the similar nature of all requestor - SC dialogs , there does not appear to be any need for the dynamic linking of buffers , and hence the buffer ...
Page 87
... buffers , and because the linked list approach to handling buffer space adds complexity . There are also advantages in keeping the entire set of data together in one contiguous address space if these data are to be swapped between main ...
... buffers , and because the linked list approach to handling buffer space adds complexity . There are also advantages in keeping the entire set of data together in one contiguous address space if these data are to be swapped between main ...
Page 88
... Information Terminal I / O Buffer The Request Control Block ( RCB ) Format , security CPU and disc respectively . We can take advantage 88 Levels Involved in the Connection Creation Process The Request Control Block (RCB) Format.
... Information Terminal I / O Buffer The Request Control Block ( RCB ) Format , security CPU and disc respectively . We can take advantage 88 Levels Involved in the Connection Creation Process The Request Control Block (RCB) Format.
Page 100
... buffer ( estimated to be 150 bytes ) . For 50 simultaneous requestors , the total working space must be 7500 bytes . At a maximum , this space requirement is equal to 150 bytes times the number of logical input ports which the SC will ...
... buffer ( estimated to be 150 bytes ) . For 50 simultaneous requestors , the total working space must be 7500 bytes . At a maximum , this space requirement is equal to 150 bytes times the number of logical input ports which the SC will ...
Common terms and phrases
access authorization access control access control matrix access group additional addressing approach aspects audit information basic buffer capabilities checking clear text communications net communications network communications path connection creation considered control commands control information control messages crypto cryptographic devices data and control Data Encryption Standard data processing dialog distributed domain enciphered encipherment encryption devices ensure entities error control fail-secure functions gateway handled HOST computers HOST-level HOST's ICD's identification/authentication implicit initial interface involved issues matrix methods mini-HOST mode multiplexed N-th party accesses N-th party authentication network control programs Network Security Center node object one-time passwords operation pair passwords performed physical and procedural possible private key problems procedural controls processor profile information protection protocol Reference Monitor relay request requestor requirements resource SC-to-SC SC's scheme security control mechanism separate sequence numbers server structure structured programming terminal tradeoffs updates usage utilized
Popular passages
Page iv - In no case does such identification imply recommendation or endorsement by the National Bureau of Standards...