Visa Protocols for Controlling Inter-Organizational Datagram Flow: Extended Description
نویسندگان
چکیده
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---one that requires distributed state information in gateways and one that uses additional encryption operations instead of distributed state. Applications for such visa protocols include access control, accounting and billing for packet transit, and network resource management. This technical report is based, in large part, upon a shorter paper [8]. We have extended the discussion of design issues and added an appendix describing a visa protocol using dual-key (public key) encryption.
منابع مشابه
Visa Protocols for Controlling Inter-Organization Datagram Flow
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---...
متن کاملVisa Protocols for Controlling Inter - Organizational
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the ow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a ow of datagrams. This paper presents and evaluates two visa protocols-one that...
متن کاملVisa protocols for controlling interorganizational datagram flow
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This paper presents and evaluates two visa protocols-one ...
متن کاملNormalized Interactions between Autonomous Agents: a Case Study in Inter-organizational Project Management
The CEC Project GOAL (Esprit 6283) aims to develop generic software tools to support a new project management paradigm, in which projects are collaborative, decentralised and inter-organizational. To support inter-organizational interaction, communication and cooperation, we are developing a design framework for formalizing the flow of information between organizations, specifying access to and...
متن کاملCellular and Mobile IP: overview and enhancements
The Internet Engineering Taskforce (IETF) Mobile IP protocol is considered to have limitations in its capability to handle large numbers of Mobile Stations moving fast between different radio cells, a process called Handoff. The Handoff frequency should typically not exceed once a second. However, Mobile IP is well suited for interconnecting disparate cellular networks effectively providing glo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1988