Design Alternatives for Computer Network Security, Volume 1; Volume 13The Bureau, 1978 - 159 pages |
From inside the book
Results 6-10 of 10
Page 15
... N - th party scheme . ( Should the user be involved in each step , or only at the first ? ) 4 . Determination of the default ... AUTHORIZATION ISSUES 2 2 2 Distributed Versus Centralized Authentication Checking N-th Party Authentication.
... N - th party scheme . ( Should the user be involved in each step , or only at the first ? ) 4 . Determination of the default ... AUTHORIZATION ISSUES 2 2 2 Distributed Versus Centralized Authentication Checking N-th Party Authentication.
Page 16
... the issues of access authorization can often be considered as extensions of those of authentication , we must consider many of the same general topics such as composite entities , N - th party situations , etc. These issues will be explored ...
... the issues of access authorization can often be considered as extensions of those of authentication , we must consider many of the same general topics such as composite entities , N - th party situations , etc. These issues will be explored ...
Page 21
... authentication problems . Autho- rization is a larger problem than authentication since the latter is strictly binary at each intermediate requestor . In contrast , the ... the Authorization Mechanism There are 21 4 N-th Party Authorization.
... authentication problems . Autho- rization is a larger problem than authentication since the latter is strictly binary at each intermediate requestor . In contrast , the ... the Authorization Mechanism There are 21 4 N-th Party Authorization.
Page 47
... N - th Party Authentication The general aspects of N - th party authentication were discussed in Section 2 and four requirements were derived which will be expanded here in terms of what the SC ... The SC Role in N-th Party Authentication.
... N - th Party Authentication The general aspects of N - th party authentication were discussed in Section 2 and four requirements were derived which will be expanded here in terms of what the SC ... The SC Role in N-th Party Authentication.
Page 48
... N - th party servers are in different domains ) , etc. Some maximum number ... authentication is complicated by the com- binatorics of the situation ... th party requirements . 3.2 ACCESS REQUEST / AUTHORIZATION After the SC has identified 48.
... N - th party servers are in different domains ) , etc. Some maximum number ... authentication is complicated by the com- binatorics of the situation ... th party requirements . 3.2 ACCESS REQUEST / AUTHORIZATION After the SC has identified 48.
Common terms and phrases
access authorization access control access control matrix access group additional addressing approach ARPA aspects audit information basic buffer bytes capabilities checking cipher text clear text communications net communications network communications path considered control block control commands control information control messages control program crypto cryptographic devices data processing denial of service detect dialog direct dial distributed enciphered encipherment encryption devices ensure entities equipment error control fail-secure functions gateway handled HOST computer HOST-level HOST's ICD's identification/authentication implementation interface involved issues Master-ICD matrix message-switching methods mini-HOST mode multiplexed Network Control Program Network Security Center node object one-time passwords passwords performed physical and procedural possible private key problems procedural controls processor profile information protection protocol redundancy relay request requestor requestor-to-SC requirements resource SC's scheme security control mechanism security mechanisms separate sequence numbers server structured programming terminal thereby tradeoffs updates usage utilized
Popular passages
Page iv - In no case does such identification imply recommendation or endorsement by the National Bureau of Standards...