Subtransport Level: The Right Place for End-to-End Security Mechanisms

نویسندگان

  • David P. Anderson
  • Domenico Ferrari
  • P. V enkat Rangan
  • Venkat Rangan
چکیده

We argue that end-to-end authentication and privacy in loosely-coupled distributed systems are not only achievable by mechanisms at the host-to-host (i.e., subtransportl level under generally satisfiable conditions, but that this solution can be more advantageous than those based on security mechanisms at higher levels of the protocol hierarchy in terms of both functionality and performance. We introduce a model of communication security and a subtransport-level protocol called ADP (the Authenticated Datagram Protocol\, which provides end-to-end authentication and privacy consistently with the definitions of the model. We then discuss the advantages of the subtransport approach. and present some experimental results from the measurement of a prototype of ADP that confirm the expected performance benefits of this approach. This research Willi supported by the Defense Advanced Research Projects Agency (DoDl, ARPA Order No. 4871, monitored by the Naval Electronic Systems Command under Contract No. N00039-84-C-0089, by the IBM Corporation, by Olivetti S.p.A., by MICOM-Interlan, Inc., by CSELT S.p.A., and by the University of California under the MICRO Program. The views and conclusions contained in this document are th011e of the authors, and should not be interpreted 1111 representing official policies, either expressed or implied, of any of the sponsoring agencies or corporations. '1 l 1

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Empirical Evaluation of a Security-Oriented Datagram Protocol

Performance considerations played an important role in the design of the Authenticated Datagram Protocol (ADP), a subtransport-level host-to-host datagram protocol that contains cryptographic mechanisms for end-to-end authentication and, optionally, privacy of messages. Several performance-motivated features were introduced into ADP. This paper describes the first phase of a measurement-based s...

متن کامل

بررسی ابعاد حق بر غذا و امنیت غذایی در اسناد بین‌المللی

The right to food and freedom from hunger is a part of fundamental human rights and it shall not be suspended under no circumstances even in the hostilities. Since any infringement of the right to food can lead to death from starvation. Different approaches to solve the problem of malnutrition in times of war and peace, including the right to food and food security have been taken. At the momen...

متن کامل

User-Centric IT Security - How to Design Usable Security Mechanisms

Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user. Today, the average end user often struggles with understanding...

متن کامل

مفهوم و جایگاه حق تأمین اجتماعی در اسناد بین‌المللی

Social security as a social and historical phenomenon, is being considered as the result of economic and social development process especially in developing industrial societies proposed as the individual security requirements against the social risks but its legal norms in the human right framework needs international community attention on the basis of issuing international documents, rules a...

متن کامل

Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the average end user. Today, the average end user often struggles with understanding...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014