Visa Protocols for Controlling Inter - Organizational
نویسندگان
چکیده
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the ow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a ow of datagrams. This paper presents and evaluates two visa protocols-one that requires distributed state information in gateways and one that uses additional encryption operations instead of distributed state. Applications for such visa protocols include access control, accounting and billing for packet transit, and network resource management. 2 Names are listed in alphabetical order.
منابع مشابه
Visa Protocols for Controlling Inter-Organizational Datagram Flow: Extended Description
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---...
متن کاملVisa Protocols for Controlling Inter-Organization Datagram Flow
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---...
متن کاملVisa protocols for controlling interorganizational datagram flow
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This paper presents and evaluates two visa protocols-one ...
متن کاملThe Role of Handheld Computers in Controlling Inter-Organizational Data Transactions
In spite of prior extensive research on the role of information systems (IS) in controlling interorganizational transactions, very little has been said about the role of handheld computers in inter-organizational control. The literature on handheld computers suggests that their facilities of mobility and connectivity engender usability patterns that are significantly different from those relate...
متن کاملA Protocol Ontology for Inter-Organizational Workflow Coordination
As coordination is a central issue in Inter-Organizational Workflow (IOW), it is quite natural to model it as a specific entity. Moreover, the structure of the different IOW coordination problems is amenable to protocols. Hence, this paper show how these protocols could be modelled and made accessible to partners involved in an IOW. More precisely, the paper proposes a coordination protocol ont...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1989