Visa Protocols for Controlling Inter-Organization Datagram Flow
نویسندگان
چکیده
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---one that requires distributed state information in gateways and one that uses additional encryption operations instead of distributed state. Applications for such visa protocols include access control, accounting and billing for packet transit, and network resource management. This technical report is based, in large part, upon a shorter paper [8]. We have extended the discussion of design issues and added an appendix describing a visa protocol using dual-key (public key) encryption.
منابع مشابه
Visa Protocols for Controlling Inter-Organizational Datagram Flow: Extended Description
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---...
متن کاملVisa protocols for controlling interorganizational datagram flow
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This paper presents and evaluates two visa protocols-one ...
متن کاملVisa Protocols for Controlling Inter - Organizational
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the ow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a ow of datagrams. This paper presents and evaluates two visa protocols-one that...
متن کاملSimple and Flexible Datagram Access Controls for UNIX-based Gateways
Internetworks that connect multiple organizations create potential security problems that cannot be solved simply by internal administrative procedures. Organizations would like to restrict inter-organization access to specific restricted hosts and applications, in order to limit the potential for damage and to reduce the number of systems that must be secured against attack. One way to restric...
متن کاملPerformance Evaluation of TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) over Destination Sequence Distance Vector (DSDV) for Random Waypoint Mobility Model
A mobile Ad-hoc network (MANET) is a collection of wireless nodes aimed at information exchange and resource sharing. The Destination Sequence Distance Vector (DSDV) a well-known and widely used protocol for MANETs. This paper presents the comparative performance analysis of TCP and UDP (two transport layer protocols) over DSDV in a Mobile Ad hoc Network. Three performance metrics: throughput, ...
متن کامل