- ABRAMSON, N. 1970 The ALOHA system--Another alternative for computer communications. In Proc AFIPS Fall dt Computer Con{, vol. 37. AFIPS Press, Arhngton, Va., pp 281-285Google Scholar
- ANDERSON, J 1972. Computer security technology planning study, vols 1 and 2 ESD-TR-73-51, AF Electronic Systems Division, Hanscom Air Force Base, Mass.Google Scholar
- BARAN, P 1964. Distributed Communlcatwns Vol. 9, Security, Secrecy, and Tamper{ree Considerations, RM-3765-PR Rand CorpGoogle Scholar
- BRANSTAO, D. 1973. Security aspects of computer networks. In Proc AIAA Computer Network Systems Conf (Huntsville, Ala., Apr ).Google Scholar
- BRANSTAD, D. K 1975 Encryptlon protection m computer data commumcatlons In Proc 4th Data Communtcattons Syrup (Quebec, Oct 7-9) IEEE, New York, pp 8-1-8-7Google Scholar
- BURRUSS, J., ET AL 1981. Specification of the transport protocol BBN Rep. 4590, Bolt, Beranek and Newman, Cambridge, Mass.Google Scholar
- CERF, V, AND KABN, R 1974 A protocol for packet network intercommumcatlon IEEE Trans Commun COM-22, 5 (May), 637-648Google Scholar
- CERr, V., AND KiRSTEIN, P T. 1978. Issues in packet-network mterconnectlon. Proc iEEE (Nov).Google Scholar
- DEFENSE COMMUNICATIONS AGENCY. 1982. Defense data network program plan.Google Scholar
- DIFFIE, W., AND HELLMAN, M. 1976. New directions in cryptography. IEEE Trans Inf Theory IT- 22, 16 (Nov.), 644-654.Google ScholarDigital Library
- EHRSAM, W., MATYAS, S., MEYER, C., AND TUCHMAN, W. 1978. A cryptographlc key management scheme for implementing the Data Encryptwn Standard. IBM Syst. J. 17, 2, 106-125.Google ScholarDigital Library
- FARBER, D., AND LARSON, K. 1972. The structure of a distributed computer system--Commumcatwns. In Proc. Syrup. Computer-Communwatwns Networks and Te!etraffic (Apr.). Microwave Research Institute of Polytechmc Institute of Brooklyn, Brooklyn, N.Y.Google Scholar
- FE!STEL, H., NOTZ, W., ANO SMITH, J. 1975. Cryptographic techniques for machine to machine data communications. Proc IEEE 63, 11 (Nov.), 1545-1554Google Scholar
- HEINRICH, F. 1978. The network security center: A system level approach to computer network security, vol. 2. NBS Special Publ. 500-21, Government Printing Office, Washington, D.C.Google Scholar
- INTERNATIONAL ORGANIZATION FOR STANDARDIZA- TION 1980. Data processing--Open systems interconnection--Basic reference model. ISO/ TC97/SC16 N537, rev Available from American National Standards Institute, New York.Google Scholar
- JUENEMAN, R., ET AL. 1983. Authentication with manipulation detection code. In Proc IEEE 1983 Syrup. Securzty and Prwacy (Apr.). IEEE, New York. Google Scholar
- KAHN, D 1967 The Code Breakers. Macmillan, New York.Google Scholar
- KAHN, R E 1967. The orgamzation of computer resources into a packet radio network. In Proc Nat. Computer Conf., vol. 44. AFIPS Press, Arhngton, Va., pp. 177-186.Google Scholar
- KARGER, P 1977. Non-dmcret~onary access control for decentralized computing systems. LCS-TR- 179, MIT Laboratory for Computer Science, Cambridge, Mass. Google Scholar
- KENT, S. 1976. Encryptlon-based protection protocols for interactive user-computer communicatwn LCS-TR-162, MIT Laboratory for Computer Science, Cambridge, Mass. Google Scholar
- KENT, S. T. 1977. Encryptlon-based protectwn for interactive user/computer communication. In Proc. 5th Data Commun~catwns Syrup (Snowbird, Utah, Sept. 27-29) IEEE, New York, pp. 5- 7-5-13. Google Scholar
- MATYAS, S, AND MEYER, C 1978. Generation, dmtrlbutlon, and installation of cryptographic keys. IBM Syst J 17, 2Google ScholarDigital Library
- MERKLE, R., AND HELLMAN, M. 1978. H~ding information and signatures m trapdoor knapsacks. IEEE Trans Inf. Theory IT-24, 5 (Sept.), 525-530.Google ScholarCross Ref
- MERKLE, R., AND HELLMAN, M. 1981. On the security of multiple encryptlon Commun. ACM 24, 7 (July), 465-467. Google ScholarDigital Library
- METCALFE, R. M., AND BOGGS, Do R. 1976. Ethernet. Distributed packet switching for local computer networks. Commun ACM 19, 7 (July), 395-404. Google ScholarDigital Library
- MEYER, C., AND TUCHMAN, W. 1972. Pseudorandom codes can be cracked. Electron Des. (Nov.).Google Scholar
- NATIONAL BUREAU OF STANDARDS. 1977. Data Encryption Standard. Federal Information Processmg Standards Publ. 46, Government Printing Office, Washington, D.C.Google Scholar
- NATIONAL BUREAU OF STANDARDS. 1980a. DES modes of operation. Preliminary Copy of Federal Information Processing Standards Publ., Government Printing Office, Washington, D C.Google Scholar
- NATIONAL BUREAU OF STANDARDS. 1980b. Telecommumcatlons: Interoperabllity and security reqmrements for use of the Data Encryption Standard m data communication systems. Proposed Federal Standard 1026, Government Printing Office, Washington, D.C.Google Scholar
- NEEDHAM, R M., AND SCHROEDER, M. D. 1978 Using encryption for authentication in large networks of computers. Commun ACM 21, 12 (Dec.), 993-998. Google ScholarDigital Library
- PETERSON, W., AND WELDON, E. 1972. Error Correcting Codes 2d ed MIT Press, Cambridge, Mass.Google Scholar
- POUZIN, L. 1973. Presentation and major design aspects of the Cyclades computer network In Proc 3rd Data Communxatlons Symp (Nov.) Google Scholar
- RIVEST, R L, SHAMIR, A, AND ADLEMAN, L 1978. A method for obtaining digital signatures and pubhc-key cryptosystems. Commun ACM 21, 2 (Feb.), 120-126. Google ScholarDigital Library
- SALTZER, J., AND SCHROEDER, M. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sept.), 1278-1308.Google ScholarCross Ref
- SAVAGE, J 1967 Some simple self-synchromzmg data scramblers. Bell Syst. Tech J 42, 2 (Feb.), 449-487Google Scholar
- SHANNON, C 1949 Communication theory of secrecy systems. Belt Syst Tech. J 28, 4 (Oct.), 656-715Google Scholar
- SUNSHINE, C 1980. Transport protocols for computer networks In Protocols and Techntques for Data Communications Networks. Prentice-Hall, Englewood Chffs, N.J.Google Scholar
- TELENET COMMUNICATIONS CORPORATION 1975. Host ~nterface specifications. Washington, D.CGoogle Scholar
- VOYDOCK, V, AND KENT, S. 1981. SecunW in higher level protocols: Approaches, alternatives, and recommendauons. BBN Rep. 4767, Bolt, Beranek, and Newman, Cambridge, Mass. Also available as National Bureau of Standards 1981, Rep ICST/HLNP--81-19, Government Printing Of. rice, Washington, D.CGoogle Scholar
Index Terms
- Security Mechanisms in High-Level Network Protocols
Recommendations
Security Mechanisms in Network Protocols
ISMS '10: Proceedings of the 2010 International Conference on Intelligent Systems, Modelling and SimulationThis paper describes few, popular security mechanisms used by network protocols. Many of protocols were designed with assumption that there are no intruders, that every device in the network should trust to other devices and users. Such assumption was ...
Comments