Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
A high security log-in procedure
Communications of the ACM
Computer Security and Protection Structures
Computer Security and Protection Structures
Computer abuse perpetrators and vulnerabilities of computer systems
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Effective safeguards for computer system integrity
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
The application of cryptography for data base security
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Modeling of encryption techniques for secrecy and privacy in multi-user networks
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Hi-index | 0.00 |
In recent years, much effort has gone into the development of high bandwidth communication networks for use over relatively short (local) distances, e.g. an office, an industrial complex, a research laboratory, etc., The high bandwidth of these networks allows many of the services now requiring separate networks such as facsimile, digitized voice, file transfer and interactive terminal data, to be integrated into a common transmission facility. Manufacturers are currently developing products which conform to the recently established IEEE 802 standard for Local Area Networks (LANs). This standard is based on the concept of a layered, "peer entity" communication protocol put forth in the International Standards Organization's (ISO) seven layer model for Open Systsms Interconnection (OSI).In this paper we define the notions of secrecy and privacy as they relate to a LAN environment and the various services a network is required to provide such as data integrity, authentication and digital signature services. We also describe the cost-benefit tradeoff involved in attaining various levels of privacy and secrecy.