Security of computer networks

被引:0
作者
Verschuren, J [1 ]
机构
[1] TNO, EIB, NL-2600 GA Delft, Netherlands
来源
STATE OF THE ART IN APPLIED CRYPTOGRAPHY | 1998年 / 1528卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A few decades ago, most computers were stand-alone machines: they were able to process information using their own resources. Later computer systems were connected to each other enabling a computer system to use resources of an other computer as well. With the coupling of computer systems, security items emerge: in general the link between computers is not protected by thorough physical means. That enables an attacker to tap or modify information on the link. In this article, a model of a distributed system is given. The provided model can also form a basis for security evaluations. Threats to the process of information exchange between computer systems are indicated. In order to counter the threats envisaged, so called security services can be implemented: two communicating computer systems can use security services in order to secure their communication link. In this article, two principal implementations of security services are addressed. The qualities of the two implementations of security services are compared with each other.
引用
收藏
页码:163 / 185
页数:23
相关论文
共 9 条
[1]  
[Anonymous], MTR3153 MITRE
[2]  
BELL DE, 1976, 2997 MTR MITRE CORP
[3]  
Biba K.J., 1977, ESDTR76372
[4]  
CLARCK DD, 1987, P 1987 IEEE S SEC PR
[5]  
*ISO, 1988, 74981 ISO
[6]  
*ISO DIS, 1988, 74982 ISO DIS
[7]  
LANDWEHR CE, 1981, COMPUT SURV, V13, P247, DOI 10.1145/356850.356852
[8]  
RUEPPEL RA, 1991, LECT NOTES COMPUTER, V547
[9]  
1991, ITSEC VERSION 1 2