Advertisement

Security of Computer Networks

  • Jan Verschuren
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1528)

Abstract

A few decades ago, most computers were stand-alone machines: they were able to process information using their own resources. Later computer systems were connected to each other enabling a computer system to use resources of an other computer as well.

With the coupling of computer systems, security items emerge: in general the link between computers is not protected by thorough physical means. That enables an attacker to tap or modify information on the link.

In this article, a model of a distributed system is given. The provided model can also form a basis for security evaluations. Threats to the process of information exchange between computer systems are indicated. In order to counter the threats envisaged, so called security services can be implemented: two communicating computer systems can use security services in order to secure their communication link. In this article, two principal implementations of security services are addressed. The qualities of the two implementations of security services are compared with each other.

Keywords

Application Program Security Policy Security Service Information Block Open System Interconnection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  1. [1]
    Information Technology Security Evaluation Criteria (ITSEC), Version 1.2, June 1991.Google Scholar
  2. [2]
    Landwehr, Carl E., “Formal Models for Computer Security”, Computing Surveys, Vol. 13, No. 3, September 1981, pp. 247–278CrossRefGoogle Scholar
  3. [3]
    Bell, D. Elliot and LaPadula, Leonard J., Secure Computer Systems: Unified Exposition and Multics Interpretation, MTR 2997 rev. 1, The MITRE Corporation, March 1976.Google Scholar
  4. [4]
    Biba, K.J., Integrity Considerations for Secure Computer Systems, MTR-3153, The MITRE Corporation, June 1975; ESD-TR-76-372, April 1977.Google Scholar
  5. [5]
    Clarck, D.D., Wilson, D.R. “A Comparison of Commercial and Military Computer Security Policies”, Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, April 1987.Google Scholar
  6. [6]
    Rueppel, R.A., A Formal Approach to Security Architectures, Advances in Cryptology-EUROCRYPT’ 91, Lecture Notes in Computer Science 547, D.W. Davies (Editor), Springer-Verlag.Google Scholar
  7. [7]
    Open Systems Interconnection Reference Model, Part 1: Basic Reference Model, ISO 7498-1 (CCITT X.200). Melbourne 1988.Google Scholar
  8. [8]
    Open Systems Interconnection Reference Model, Part 2: Security Architecture, ISO DIS 7498-2, July 19, 1988.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Jan Verschuren
    • 1
  1. 1.TNO-EIBGA DelftThe Netherlands

Personalised recommendations