Design Alternatives for Computer Network Security, Volume 1; Volume 13The Bureau, 1978 - 159 pages |
From inside the book
Results 1-5 of 33
Page iii
... mean Top Secret , Secret , Confidential and Unclassified . Rather than modify this nomenclature throughout the document , the editor requests that the reader adapt the concept of classification levels and protection levels to those ...
... mean Top Secret , Secret , Confidential and Unclassified . Rather than modify this nomenclature throughout the document , the editor requests that the reader adapt the concept of classification levels and protection levels to those ...
Page xi
... means of Intelligent cryptographic Devices , which could be remotely keyed by the Security Controller when a requested communication was authorized . The Intelligent Cryptographic Device would incorporate the National Bureau of ...
... means of Intelligent cryptographic Devices , which could be remotely keyed by the Security Controller when a requested communication was authorized . The Intelligent Cryptographic Device would incorporate the National Bureau of ...
Page 6
... means all of the network security problems , but represent the larger scope of the problems above and beyond that of ... mean by " computer net- work security . " First , a computer network can be defined as an inter- connected set of ...
... means all of the network security problems , but represent the larger scope of the problems above and beyond that of ... mean by " computer net- work security . " First , a computer network can be defined as an inter- connected set of ...
Page 11
... mean the process of determining who or what an entity claims to be , and refer to the process of verifying this claim as authen- ticating ( e.g. , by using a password ) . The security aspects of concern are primarily those of ...
... mean the process of determining who or what an entity claims to be , and refer to the process of verifying this claim as authen- ticating ( e.g. , by using a password ) . The security aspects of concern are primarily those of ...
Page 13
... means of a duplicated facility in order to provide a secondary or back - up capability such that a failure in the primary checking mechanism does not result in a loss of network access . logistics problems of managing a duplicated data ...
... means of a duplicated facility in order to provide a secondary or back - up capability such that a failure in the primary checking mechanism does not result in a loss of network access . logistics problems of managing a duplicated data ...
Common terms and phrases
access authorization access control access control matrix access group additional addressing approach aspects audit information basic buffer capabilities checking clear text communications net communications network communications path connection creation considered control commands control information control messages crypto cryptographic devices data and control Data Encryption Standard data processing dialog distributed domain enciphered encipherment encryption devices ensure entities error control fail-secure functions gateway handled HOST computers HOST-level HOST's ICD's identification/authentication implicit initial interface involved issues matrix methods mini-HOST mode multiplexed N-th party accesses N-th party authentication network control programs Network Security Center node object one-time passwords operation pair passwords performed physical and procedural possible private key problems procedural controls processor profile information protection protocol Reference Monitor relay request requestor requirements resource SC-to-SC SC's scheme security control mechanism separate sequence numbers server structure structured programming terminal tradeoffs updates usage utilized
Popular passages
Page iv - In no case does such identification imply recommendation or endorsement by the National Bureau of Standards...