Controls for Interorganization Networks

作者: D. Estrin

DOI: 10.1109/TSE.1987.233149

关键词:

摘要: Interorganization computer networks support person-to-person communication via electronic mail; exchange of cad/cam data, software modules, or documents file transfer; input to an order-entry accounting system a database query and update protocol; use shared computational resources asynchronous message protocol remote login. In most such interorganization arrangements, the set that organization wants make accessible outsiders is significantly smaller than it remain strictly-internal (i.e., employees only). addition, because potential user person (or machine) outside boundaries organization, damage associated with undesired can be high. Because these characteristics, Networks (ION's) have unique usage-control requirements.

参考文章(5)
D Estrin, Inter-organization networks: implications of access control: requirements for interconnection protocol acm special interest group on data communication. ,vol. 16, pp. 254- 264 ,(1986) , 10.1145/1013812.18201
Steven B. Lipner, Non-Discretionery Controls for Commercial Applications ieee symposium on security and privacy. pp. 2- 2 ,(1982) , 10.1109/SP.1982.10022
Deborah Estrin, Non-Discretionary Controls for Inter-Organization Networks ieee symposium on security and privacy. pp. 56- 56 ,(1985) , 10.1109/SP.1985.10004
Carl E. Landwehr, Constance L. Heitmeyer, John McLean, A security model for military message systems ACM Transactions on Computer Systems. ,vol. 2, pp. 198- 222 ,(1984) , 10.1145/989.991
Roger M. Needham, Michael D. Schroeder, Using encryption for authentication in large networks of computers Communications of the ACM. ,vol. 21, pp. 993- 999 ,(1978) , 10.1145/359657.359659