Visa protocols for controlling interorganizational datagram flow
نویسندگان
چکیده
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This paper presents and evaluates two visa protocols-one that requires distributed state information in gateways and one that uses additional encryption operations instead of distributed state. Applications for such visa protocols include access control, accounting and billing for packet transit, and network resource management.
منابع مشابه
Visa Protocols for Controlling Inter-Organizational Datagram Flow: Extended Description
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---...
متن کاملVisa Protocols for Controlling Inter-Organization Datagram Flow
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. This report presents and evaluates two visa protocols ---...
متن کاملVisa Protocols for Controlling Inter - Organizational
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the ow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a ow of datagrams. This paper presents and evaluates two visa protocols-one that...
متن کاملEnterprise Considerations for Ports and Protocols
The need to control information flow to a restricted set of accepted protocols arises from the vulnerabilities that may come from any protocol. Reducing the acceptable protocols to a small set of well-tested standard protocols will reduce the attack surface and provide high confidence in selected communications. These protocols are restricted to specific ports or addresses in the receiving web ...
متن کاملFLOWS: Performance Guarantees in Best Effort Delivery Systems
A best effort delivery system provides a connectionless, datagram service in which the packets may be delayed or dropped in the presence of congestion. The underlying network does not make any guarantees about performance to an application. Performance needs of various applications differ greatly and applications such as packet voice and video have strict performance requirements. Existing netw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Journal on Selected Areas in Communications
دوره 7 شماره
صفحات -
تاریخ انتشار 1989