INFORMATION SECURITY IN OPEN SYSTEMS

被引:0
|
作者
KARILA, A
机构
关键词
NETWORK PROTOCOLS; DATA ENCRYPTION; SECURITY AND PROTECTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An architecture for building secure open systems communicating via untrusted networks is presented. The work is based on the ISO OSI reference model and its security architecture addendum but the results are directly applicable to virtually any layered communications architecture such as the DoD Internet architecture (TCP/IP). A semiformal model for the security of communications between peer entities within an OSI layer and between entire application instances is presented. This model, along with some new concepts introduced, is successfully used to analyze the security functions of open systems. The degree of freedom offered by the OSI Security Architecture in placing the security services and mechanisms defined in the OSI reference model into its layers is restricted in such a way as to not affect the security of the over-all communication service. Well founded placements for various services and mechanisms are proposed. These ideas were tested in practice with a working implementation of secure ISO FTAM service.
引用
收藏
页码:459 / 478
页数:20
相关论文
共 50 条
  • [1] INFORMATION SECURITY IN OPEN SYSTEMS
    KREUTZ, H
    [J]. ELECTRONIC INFORMATION SYSTEMS: REALIZATION, CHOICES AND USE, 1989, : 91 - 100
  • [2] INFORMATION SECURITY CONSIDERATIONS IN OPEN SYSTEMS ARCHITECTURES
    KLEIN, SA
    MENENDEZ, JN
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 1993, 8 (01) : 224 - 230
  • [3] Open information systems and data security in medicine
    Blobel, B
    [J]. TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 168 - 182
  • [4] The evolution of health information systems, security in practice and open issues
    Bakker, AR
    [J]. ADVANCED HEALTH TELEMATICS AND TELEMEDICINE: THE MAGDEBURG EXPERT SUMMIT TEXTBOOK, 2003, 96 : 15 - 20
  • [5] Security in open systems
    Schneider, W
    [J]. NETWORK EMPOWERMENT, 2004, 192 : 27 - 44
  • [6] Security issues in information systems based on open-source technologies
    Greiner, S
    Boskovic, B
    Brest, J
    Zumer, V
    [J]. IEEE REGION 8 EUROCON 2003, VOL B, PROCEEDINGS: COMPUTER AS A TOOL, 2003, : 12 - 15
  • [7] Information systems security in the information systems curriculum
    Eastman, C
    Farkas, C
    [J]. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 117 - 118
  • [8] Security of information in IT systems
    Kaliczynska, M
    [J]. Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments III, 2005, 5775 : 571 - 576
  • [9] Information systems resources and information security
    Chang, Kuo-chung
    Wang, Chih-ping
    [J]. INFORMATION SYSTEMS FRONTIERS, 2011, 13 (04) : 579 - 593
  • [10] Information systems resources and information security
    Kuo-chung Chang
    Chih-ping Wang
    [J]. Information Systems Frontiers, 2011, 13 : 579 - 593