scispace - formally typeset
Search or ask a question

Showing papers on "Internet security published in 1992"


Book
01 Nov 1992
TL;DR: The Billion-Node Internet and Future Directions, a review of the internet evolution and future Directions, and annotated Bibliography are published.
Abstract: I. INTRODUCTION. 1. Historical Evolution. 2. Globalization of the Internet. 3. Evolving the System. II. TECHNOLOGIES. 1. Core Protocols. 2. Routing Protocols. 3. Main Applications. 4. A Practical Perspective on Routers. 5. A Practical Perspective on Host Networking. 6. Architectural Security. 7. Creating New Applications. III. INFRASTRUCTURE. 1. Directory Services. 2. Network Management. 3. Tools for anInternet Backbone. 4. Tools for an Internet Component IP. 5. Network Performance. 6. Operational Security. IV. DIRECTIONS. 1. The Billion-Node Internet. 2. Internet Evolution and Future Directions. Annotated Bibliography. Index. 0201567415T04062001

63 citations


Proceedings ArticleDOI
15 Jun 1992
TL;DR: The concept of integrated security system (ISS) and its realization are described, and encryption tools are used for information secrecy, and authentication tools is used for user identification and access control.
Abstract: The concept of integrated security system (ISS) and its realization are described. An integrated security system protects information network systems from computer viruses, hackers and other computer crimes. For this purpose, the ISS requires three mechanisms: information secrecy, user identification and access control mechanisms. The information secrecy mechanism protects information against intrusion through 'non-gates' of the information network systems. User identification mechanism permits authorized users to enter the systems only at 'the gates'. Access control mechanism allows only the users with permission to actually access data. The author implements an integrated security system using an ID-based security scheme. The ID-based security scheme provides encryption tools and authentication tools Encryption tools are used for information secrecy, and authentication tools are used for user identification and access control. >

45 citations


Proceedings ArticleDOI
09 Jun 1992
TL;DR: The design and implementation of the Virtual Internet Protocol (VIP) are described and measured results indicate that VIP can achieve host migration transparency in the Internet with negligible overhead.
Abstract: The design and implementation of the Virtual Internet Protocol (VIP) are described. The VIP was implemented by modifying an operating system kernel based on 4.3BSD. The overhead of VIP is compared to that of IP. Measured results indicate that VIP can achieve host migration transparency in the Internet with negligible overhead. >

39 citations


Proceedings ArticleDOI
11 Oct 1992
TL;DR: It is pointed out that security at the network layer cannot provide application-specific services associated with electronic mail such as signed receipts and digital signatures, but these deficiencies can be remedied by providing end user to end user security where mail messages are black (protected/encrypted) at all intermediate points.
Abstract: It is pointed out that security at the network layer cannot provide application-specific services associated with electronic mail such as signed receipts and digital signatures These deficiencies can be remedied by providing end user to end user security where mail messages are black (protected/encrypted) at all intermediate points The authors describe the approach and implementation taken in building such a mail security device Mail messages are protected along the entire path from originator to recipient The messages are protected during storage and processing at all intermediate points the security can be implemented independently of the network layer architecture or a network layer security device The key distribution technique is suitable for client-server architectures such as electronic mail, where the number of users is large and connectivity is diverse >

27 citations


Proceedings ArticleDOI
11 Nov 1992
TL;DR: The development of security extensions to the FTP file transfer utility/protocol in the TCP/IP communications suite in order to provide authentication of the user and encryption of the files transferred is described.
Abstract: With the spread of internetworks able to link LANs, and the availability of network hardware to monitor network traffic, the need to add additional security to traditional network utilities is becoming imperative. The development of security extensions to the FTP file transfer utility/protocol in the TCP/IP communications suite in order to provide authentication of the user and encryption of the files transferred is described. Specific security issues, including some alternatives for providing these security extensions, are given, and the final choice is explained. Initial trials of the implementation are presented. These show that on a single LAN link there is a performance penalty in providing encryption, but that over a wide area internetwork this is masked by the network delays. >

7 citations