Design Alternatives for Computer Network Security, Volume 1; Volume 13The Bureau, 1978 - 159 pages |
From inside the book
Results 1-5 of 15
Page 38
... multiplexed such as packet switched ) . These latter tradeoffs will be discussed in Section 5 , but our concern at this point is to establish the types of traffic that must be handled . * One such type of traffic is control . These ...
... multiplexed such as packet switched ) . These latter tradeoffs will be discussed in Section 5 , but our concern at this point is to establish the types of traffic that must be handled . * One such type of traffic is control . These ...
Page 41
... MULTIPLEXED The Security Controller is a refinement and renaming of what. HOST / SC LEVEL CRYPTO - DEVICE LEVEL MINI- HOST MUX SLAVE ICD OTHER SC DOMAIN ( S ) HOST DOMAIN OF THE SECURITY CONTROLLER 1 SECURITY CONTROLLER HOST MUX MASTER ...
... MULTIPLEXED The Security Controller is a refinement and renaming of what. HOST / SC LEVEL CRYPTO - DEVICE LEVEL MINI- HOST MUX SLAVE ICD OTHER SC DOMAIN ( S ) HOST DOMAIN OF THE SECURITY CONTROLLER 1 SECURITY CONTROLLER HOST MUX MASTER ...
Page 64
... multiplexed cryptographic devices , which would select the proper key based on the addressing information . These devices must be kept as simple as possible to ensure their accreditation as being secure . We will leave this area of ...
... multiplexed cryptographic devices , which would select the proper key based on the addressing information . These devices must be kept as simple as possible to ensure their accreditation as being secure . We will leave this area of ...
Page 67
... multiplexed devices ( e.g. , HOST computers ) . In that case , the relay operation would be performed via the resource as shown in ( b ) , rather than requir- ing each requesting terminal to have a relay capability . These issues will ...
... multiplexed devices ( e.g. , HOST computers ) . In that case , the relay operation would be performed via the resource as shown in ( b ) , rather than requir- ing each requesting terminal to have a relay capability . These issues will ...
Page 104
... multiplexed or dedicated , ( 2 ) whether there is a Master - Slave relationship in the inter - crypto device control , and ( 3 ) whether the devices need to be able to relay connection creation messages along to another ICD . Each of ...
... multiplexed or dedicated , ( 2 ) whether there is a Master - Slave relationship in the inter - crypto device control , and ( 3 ) whether the devices need to be able to relay connection creation messages along to another ICD . Each of ...
Common terms and phrases
access authorization access control access control matrix access group additional addressing approach aspects audit information basic buffer capabilities checking clear text communications net communications network communications path connection creation considered control commands control information control messages crypto cryptographic devices data and control Data Encryption Standard data processing dialog distributed domain enciphered encipherment encryption devices ensure entities error control fail-secure functions gateway handled HOST computers HOST-level HOST's ICD's identification/authentication implicit initial interface involved issues matrix methods mini-HOST mode multiplexed N-th party accesses N-th party authentication network control programs Network Security Center node object one-time passwords operation pair passwords performed physical and procedural possible private key problems procedural controls processor profile information protection protocol Reference Monitor relay request requestor requirements resource SC-to-SC SC's scheme security control mechanism separate sequence numbers server structure structured programming terminal tradeoffs updates usage utilized
Popular passages
Page iv - In no case does such identification imply recommendation or endorsement by the National Bureau of Standards...