Change search
ReferencesLink to record
Permanent link

Direct link
SPION: Secure Protocols in OSI Networks
Number of Authors: 3
1989 (English)Report (Refereed)
Abstract [en]

SPION: Secure Protocols in OSI Networks This report describes how security services can be realized in a computer network using the protocols of the Open Systems Interconnection (OSI) reference model for communication. The report starts with defining security requirements for a "typical" local area network in a company, university or similar organization. It is assumed that the organization does not use the network for transfer of extremely sensitive information, such as military secrets. A set of security services, as specified in the OSI security architecture, are selected in order to satisfy the requirements. The selected services are then placed in suitable layers of the OSI model according to the criteria in the security architecture, and to the taste of the authors. The report concentrates on the transport layer. An extension of the OSI transport protocol, class 4, including security services is described in detail. The protocol is a fully compatible extension of the standard transport protocol. Key management is another topic which is included in the report. A key management system for handling public keys and digital signatures based on an article by Dorothy E. Denning is described. The system includes functions for distributing and validating public keys, and registering and later verifying digital signatures. A key management protocol supporting these functions is defined for communication between ordinary open systems and special key server systems.

Place, publisher, year, edition, pages
Swedish Institute of Computer Science , 1989, 1. , 42 p.
SICS Technical Report, ISSN 1100-3154 ; T89:13
National Category
Computer and Information Science
URN: urn:nbn:se:ri:diva-14112OAI: diva2:1035396
Original report number T89013.Available from: 2016-10-13 Created: 2016-10-13

Open Access in DiVA

fulltext(3177 kB)1 downloads
File information
File name FULLTEXT01.pdfFile size 3177 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 1 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

ReferencesLink to record
Permanent link

Direct link