Design Alternatives for Computer Network Security, Volume 1; Volume 13The Bureau, 1978 - 159 pages |
From inside the book
Results 6-10 of 62
Page 10
... resources if given an opportunity . The nature of these hostile elements and the resources to be protected , leads to ... resource - sharing computer , while others are unique to the multi - system environment of a network . These unique ...
... resources if given an opportunity . The nature of these hostile elements and the resources to be protected , leads to ... resource - sharing computer , while others are unique to the multi - system environment of a network . These unique ...
Page 11
... resources , control mechanisms associated with these resources must have some way of determining and verifying the identity of the requestors . We use the term identification to mean the process of determining who or what an entity ...
... resources , control mechanisms associated with these resources must have some way of determining and verifying the identity of the requestors . We use the term identification to mean the process of determining who or what an entity ...
Page 13
... ( resource ) . However , this does not imply that only the centralized check would be made ; distributed authentication checks could also be made , either as a two step check for particularly sensitive resources , or as part of an ...
... ( resource ) . However , this does not imply that only the centralized check would be made ; distributed authentication checks could also be made , either as a two step check for particularly sensitive resources , or as part of an ...
Page 15
... resource , since knowledge of the requestor is necessary to determine if the requested access is authorized . The information which defines the rights of requestors to access various protected objects ( HOST computers , files , etc ...
... resource , since knowledge of the requestor is necessary to determine if the requested access is authorized . The information which defines the rights of requestors to access various protected objects ( HOST computers , files , etc ...
Page 18
... resources shall be separated ( compartmentalized ) whenever such separation adds to security ( reference Jones ; JON - 73 ) ... resource . ) ( Reference Anderson ; AND - 72 . ) 4. Object Versus Path Protection Protection can be provided to ...
... resources shall be separated ( compartmentalized ) whenever such separation adds to security ( reference Jones ; JON - 73 ) ... resource . ) ( Reference Anderson ; AND - 72 . ) 4. Object Versus Path Protection Protection can be provided to ...
Common terms and phrases
access authorization access control access control matrix access group additional addressing approach aspects audit information basic buffer capabilities checking clear text communications net communications network communications path connection creation considered control commands control information control messages crypto cryptographic devices data and control Data Encryption Standard data processing dialog distributed domain enciphered encipherment encryption devices ensure entities error control fail-secure functions gateway handled HOST computers HOST-level HOST's ICD's identification/authentication implicit initial interface involved issues matrix methods mini-HOST mode multiplexed N-th party accesses N-th party authentication network control programs Network Security Center node object one-time passwords operation pair passwords performed physical and procedural possible private key problems procedural controls processor profile information protection protocol Reference Monitor relay request requestor requirements resource SC-to-SC SC's scheme security control mechanism separate sequence numbers server structure structured programming terminal tradeoffs updates usage utilized
Popular passages
Page iv - In no case does such identification imply recommendation or endorsement by the National Bureau of Standards...