Encryption-based protection for interactive user/computer communication

  • Authors:
  • Stephen Thomas Kent

  • Affiliations:
  • -

  • Venue:
  • SIGCOMM '77 Proceedings of the fifth symposium on Data communications
  • Year:
  • 1977

Quantified Score

Hi-index 0.02

Visualization

Abstract

This paper develops a virtual connection model, complete with intruder, for interactive terminal-host communication and presents a set of protection goals that characterize the security that can be provided for a physically unsecured connection. Fundamental requirements for protocols that achieve these goals and the role of encryption in the design of such protocols are examined. Functional and security constraints on positioning of protection protocols in a communication system and the impact of positioning on the design of secure operating systems are discussed.