Visa protocols for controlling interorganizational datagram flow

نویسندگان

  • Deborah Estrin
  • Jeffrey C. Mogul
  • Gene Tsudik
چکیده

The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This paper presents and evaluates two visa protocols-one that requires distributed state information in gateways and one that uses additional encryption operations instead of distributed state. Applications for such visa protocols include access control, accounting and billing for packet transit, and network resource management.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Visa Protocols for Controlling Inter-Organizational Datagram Flow: Extended Description

The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---...

متن کامل

Visa Protocols for Controlling Inter-Organization Datagram Flow

The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---...

متن کامل

Visa Protocols for Controlling Inter - Organizational

The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the ow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a ow of datagrams. This paper presents and evaluates two visa protocols-one that...

متن کامل

Enterprise Considerations for Ports and Protocols

The need to control information flow to a restricted set of accepted protocols arises from the vulnerabilities that may come from any protocol. Reducing the acceptable protocols to a small set of well-tested standard protocols will reduce the attack surface and provide high confidence in selected communications. These protocols are restricted to specific ports or addresses in the receiving web ...

متن کامل

FLOWS: Performance Guarantees in Best Effort Delivery Systems

A best effort delivery system provides a connectionless, datagram service in which the packets may be delayed or dropped in the presence of congestion. The underlying network does not make any guarantees about performance to an application. Performance needs of various applications differ greatly and applications such as packet voice and video have strict performance requirements. Existing netw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Journal on Selected Areas in Communications

دوره 7  شماره 

صفحات  -

تاریخ انتشار 1989