Communications and Computer Security
WIS is being planned and developed to meet the communications requirements of the Authority. WIS will be a digital network, largely following CCITT, IDN/ISDN standards and recommendations. The study of the WIS COMSEC/COMPUSEC subsystem, as developed and presented in this chapter was carried out in the light of the requirements summarized in Chapter 2.
KeywordsSlip Rate Computer Security User Site Fibre Optic Cable Secure Area
Unable to display preview. Download preview PDF.
- 1.“Information Processing Systems - OSI Reference Model”, International Standards Organization, Public No. 7498, October 1984.Google Scholar
- 2.“L. D. Faurer and R. H. Courtney, ”Computer Security, the Defense Department, and the Private Sector - A3-Part Dialogue about Fundamental Objectives and Needs“, Computer Security Journal, Summer 1984.Google Scholar
- 3.“DoD Trusted Computer Systems Evaluation Criteria”, United States Department of Defense, Publication No. 5200.28, December 1985.Google Scholar
- 4.“Guidance for Applying the Department of Defense Trusted Computer Systems Evaluation Criteria in Specific Environments”, United States Department of Defense Computer Security Center, Publication No. CSC-STD-004–85, June 1985.Google Scholar
- 5.“DoD Trusted Network Interpretations”, National Computer Security Center, Publication No. NCSC-TG-005, Version 1, July 1987.Google Scholar
- 6.“DoD Password Management Guideline”, United States Department of Defense Computer Security Center, Publication No. CSC-STD-002–85, April 1985.Google Scholar
- 7.B. C. Karp, L. K. Barker and L. D. Nelson, “The Secure Data Network System”, ATT Technical Journal, Vol. 67, No. 3, May/June 1988, pp. 19–27.Google Scholar
- 8.Proceedings of the 1987 IEEE Symposium on Security and Privacy, ISBN 081860771–8, Oakland, California, April 27–29, 1987.Google Scholar
- 9.Proceedings of the 10th National Computer Security Conference, September 2124, 1987.Google Scholar