skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 51667 Add to Shopping cart Find in a Library
Title: COMPUTER SCIENCE AND TECHNOLOGY - DESIGN ALTERNATIVES FOR COMPUTER NETWORK SECURITY
Author(s): G D COLE
Corporate Author: US Dept of Commerce
National Bureau of Standards
United States of America
Editor(s): D K BRANSTAD
Date Published: 1978
Page Count: 177
Sponsoring Agency: National Technical Information Service
Springfield, VA 22151
National Telecommunications and Information Admin
Washington, DC 20230
US Dept of Commerce
Washington, DC 20234
Contract Number: 5-35934
Publication Number: NBS SP 500-21, V 1
Sale Source: National Technical Information Service
US Dept of Commerce
5285 Port Royal Road
Springfield, VA 22151
United States of America
Language: English
Country: United States of America
Annotation: THE CRITICAL ISSUES AND PROBLEMS RELATING TO COMPUTER NETWORK SECURITY ARE IDENTIFIED, AND THE MECHANISMS WHICH MIGHT IMPLEMENT THE POLICY/SOLUTIONS ARE DISCUSSED, ALONG WITH THE TRADEOFFS RELATING TO THESE MECHANISMS.
Abstract: THE COMPUTER-NETWORK SECURITY PROBLEM IS SEEN TO BE NOT MERELY A COMMUNICATIONS PROBLEM, BUT RATHER A COMPLEX SET OF PROBLEMS DUE TO MULTISYSTEM NATURE OF THE NETWORK. OF THE ALTERNATIVE SECURITY MECHANISMS CONSIDERED, THE MOST VIABLE ARE CONSIDERED TO BE THE SECURITY CONTROLLER AND INTELLIGENT CRYTOPGRAPHIC DEVICE. THE CONCEPT EMPLOYING THE MECHANISMS INVOLVES THE USE OF A DEDICATED MINICOMPUTER TO CONTROL ACCESS TO A COMPUTER NETWORK THROUGH THE CONTROL OF DATA ENCRYPTION KEYS; I.E., PARAMETERS, TYPICALLY BINARY NUMBERS, THAT CONTROL THE PROCESSES OF ENCIPHERING AND DECIPHERING COMPUTER DATA. AN AUTHORIZED USER OR TERMINAL IN A COMPUTER NETWORK IS ISSUED AN ENCRYPTION KEY TO OBTAIN ACCESS AFTER THE CREDENTIALS OF THE USER OR TERMINAL HAVE BEEN VERIFIED. IN EXAMINING THE USE OF THIS SECURITY CONCEPT, THE NETWORK IS VIEWED AS CONSISTING OF SEVERAL LEVELS, AND THE PRESENTATION PROCEEDS IN A TOP-DOWN ANALYSIS INVOLVING THE FOLLOWING: (1) THE POLICY AND REQUIREMENTS ISSUES; (2) THE HOST COMPUTERS SECURITY CONTROL SYSTEMS; (3) THE INTELLIGENT CRYPTOGRAPHIC DEVICE; AND (4) THE COMMUNICATIONS NETWORK. WITHIN EACH LEVEL, THE ISSUES RELATED TO AUTHENTICATION, AUTHORIZATION, CONNECTION ESTABLISHMENT, CONNECTION USAGE, SECURITY MONITORING, AND SECURITY ASSURANCE ARE CONSIDERED. IN ADDITION TO TECHNICAL CONSIDERATIONS, PROCEDURAL AND ECONOMIC ASPECTS ARE DISCUSSED. IT IS BELIEVED THAT THE APPROACH SUGGESTED WILL PROVIDE THE NECESSARY CONTROL MECHANISMS TO HANDLE THE COMPLICATIONS OF THE NETWORK ENVIRONMENT AND PROVIDE A VIABLE AND EVOLUTIONARY APPROACH TO ACHIEVING THIS GOAL IN BOTH EXISTING AND FUTURE NETWORKS. A BIBLIOGRAPHY IS PROVIDED. (AUTHOR ABSTRACT MODIFIED--RCB)
Index Term(s): Computer privacy and security; Telecommunications
Note: NATIONAL BUREAU OF STANDARDS SPECIAL PUBLICATION
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=51667

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.