Visa Protocols for Controlling Inter-Organization Datagram Flow

نویسندگان

  • Deborah Estrin
  • Jeffrey C. Mogul
  • Gene Tsudik
  • Kamaljit Anand
چکیده

The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---one that requires distributed state information in gateways and one that uses additional encryption operations instead of distributed state. Applications for such visa protocols include access control, accounting and billing for packet transit, and network resource management. This technical report is based, in large part, upon a shorter paper [8]. We have extended the discussion of design issues and added an appendix describing a visa protocol using dual-key (public key) encryption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Visa Protocols for Controlling Inter-Organizational Datagram Flow: Extended Description

The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---...

متن کامل

Visa protocols for controlling interorganizational datagram flow

The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This paper presents and evaluates two visa protocols-one ...

متن کامل

Visa Protocols for Controlling Inter - Organizational

The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the ow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a ow of datagrams. This paper presents and evaluates two visa protocols-one that...

متن کامل

Simple and Flexible Datagram Access Controls for UNIX-based Gateways

Internetworks that connect multiple organizations create potential security problems that cannot be solved simply by internal administrative procedures. Organizations would like to restrict inter-organization access to specific restricted hosts and applications, in order to limit the potential for damage and to reduce the number of systems that must be secured against attack. One way to restric...

متن کامل

Performance Evaluation of TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) over Destination Sequence Distance Vector (DSDV) for Random Waypoint Mobility Model

A mobile Ad-hoc network (MANET) is a collection of wireless nodes aimed at information exchange and resource sharing. The Destination Sequence Distance Vector (DSDV) a well-known and widely used protocol for MANETs. This paper presents the comparative performance analysis of TCP and UDP (two transport layer protocols) over DSDV in a Mobile Ad hoc Network. Three performance metrics: throughput, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1989