Visa protocols for controlling interorganizational datagram flow

  • Authors:
  • D. Estrin;J. C. Mogul;G. Tsudik

  • Affiliations:
  • Dept. of Comput. Sci., Univ. of Southern California, Los Angeles, CA, USA;-;-

  • Venue:
  • IEEE Journal on Selected Areas in Communications
  • Year:
  • 1989

Quantified Score

Hi-index 0.07

Visualization

Abstract

The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. Two visa protocols are presented and evaluated: one that requires distributed state information in gateways and one that uses additional encryptions instead of distributed state. Applications for such visa protocols include access control, accounting and billing for packet transit, and network resource management.