Design Alternatives for Computer Network Security, Volume 1; Volume 13The Bureau, 1978 - 159 pages |
From inside the book
Results 1-5 of 17
Page 46
... relay to the SC for checking . This approach would inherently include the handling of terminals that are hard - wired to the HOST , would allow a degraded mode of operation ( dead SC ) , and might give some apparent increase in ...
... relay to the SC for checking . This approach would inherently include the handling of terminals that are hard - wired to the HOST , would allow a degraded mode of operation ( dead SC ) , and might give some apparent increase in ...
Page 62
... relays the setup message to the resource via the requestor . This minimizes the number of connections which must be ... relay the control messages in the opposite direction , i.e. , from the SC to the resource to the requestor . This ...
... relays the setup message to the resource via the requestor . This minimizes the number of connections which must be ... relay the control messages in the opposite direction , i.e. , from the SC to the resource to the requestor . This ...
Page 67
... relay messages , the addressing information can be handled by either of the two methods that were considered under gateways , namely nested leaders and cyclically permuted leader fields . For direct SC - to - requestor and SC - to ...
... relay messages , the addressing information can be handled by either of the two methods that were considered under gateways , namely nested leaders and cyclically permuted leader fields . For direct SC - to - requestor and SC - to ...
Page 68
... Relay Message via the Requestor SC Resource Priming Requestor Working Connection ( c ) Separate Priming of Each End Resource Initial Requestor - SC Connection Set up of working Connection + Working Connection Requestor ( b ) SC Relay ...
... Relay Message via the Requestor SC Resource Priming Requestor Working Connection ( c ) Separate Priming of Each End Resource Initial Requestor - SC Connection Set up of working Connection + Working Connection Requestor ( b ) SC Relay ...
Page 69
... relay the connection request one additional link ; namely to echo it back to the SC with connection status information indicated in the message field . The information in the relay mode of operation must include that of several protocol ...
... relay the connection request one additional link ; namely to echo it back to the SC with connection status information indicated in the message field . The information in the relay mode of operation must include that of several protocol ...
Common terms and phrases
access authorization access control access control matrix access group additional addressing approach aspects audit information basic buffer capabilities checking clear text communications net communications network communications path connection creation considered control commands control information control messages crypto cryptographic devices data and control Data Encryption Standard data processing dialog distributed domain enciphered encipherment encryption devices ensure entities error control fail-secure functions gateway handled HOST computers HOST-level HOST's ICD's identification/authentication implicit initial interface involved issues matrix methods mini-HOST mode multiplexed N-th party accesses N-th party authentication network control programs Network Security Center node object one-time passwords operation pair passwords performed physical and procedural possible private key problems procedural controls processor profile information protection protocol Reference Monitor relay request requestor requirements resource SC-to-SC SC's scheme security control mechanism separate sequence numbers server structure structured programming terminal tradeoffs updates usage utilized
Popular passages
Page iv - In no case does such identification imply recommendation or endorsement by the National Bureau of Standards...