Advertisement

Communications and Computer Security

  • A. Nejat Ince
  • Dag Wilhelmsen
  • Bülent Sankur
Part of the The Springer International Series in Engineering and Computer Science book series (SECS, volume 308)

Abstract

WIS is being planned and developed to meet the communications requirements of the Authority. WIS will be a digital network, largely following CCITT, IDN/ISDN standards and recommendations. The study of the WIS COMSEC/COMPUSEC subsystem, as developed and presented in this chapter was carried out in the light of the requirements summarized in Chapter 2.

Keywords

Slip Rate Computer Security User Site Fibre Optic Cable Secure Area 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  1. 1.
    “Information Processing Systems - OSI Reference Model”, International Standards Organization, Public No. 7498, October 1984.Google Scholar
  2. 2.
    “L. D. Faurer and R. H. Courtney, ”Computer Security, the Defense Department, and the Private Sector - A3-Part Dialogue about Fundamental Objectives and Needs“, Computer Security Journal, Summer 1984.Google Scholar
  3. 3.
    “DoD Trusted Computer Systems Evaluation Criteria”, United States Department of Defense, Publication No. 5200.28, December 1985.Google Scholar
  4. 4.
    “Guidance for Applying the Department of Defense Trusted Computer Systems Evaluation Criteria in Specific Environments”, United States Department of Defense Computer Security Center, Publication No. CSC-STD-004–85, June 1985.Google Scholar
  5. 5.
    “DoD Trusted Network Interpretations”, National Computer Security Center, Publication No. NCSC-TG-005, Version 1, July 1987.Google Scholar
  6. 6.
    “DoD Password Management Guideline”, United States Department of Defense Computer Security Center, Publication No. CSC-STD-002–85, April 1985.Google Scholar
  7. 7.
    B. C. Karp, L. K. Barker and L. D. Nelson, “The Secure Data Network System”, ATT Technical Journal, Vol. 67, No. 3, May/June 1988, pp. 19–27.Google Scholar
  8. 8.
    Proceedings of the 1987 IEEE Symposium on Security and Privacy, ISBN 08186­0771–8, Oakland, California, April 27–29, 1987.Google Scholar
  9. 9.
    Proceedings of the 10th National Computer Security Conference, September 21­24, 1987.Google Scholar

Copyright information

© Springer Science+Business Media New York 1995

Authors and Affiliations

  • A. Nejat Ince
    • 1
  • Dag Wilhelmsen
    • 2
  • Bülent Sankur
    • 3
  1. 1.Centre for Defence StudiesIstanbul Technical University FoundationTurkey
  2. 2.ALCATEL Telecom NorwayNorway
  3. 3.Boğaziçi UniversityIstanbulTurkey

Personalised recommendations