Abstract
This paper explores the uses for security mechanisms confined to OSI layer 2, even in LANs that also employ wide area protocols up through layer 7. These mechanisms must be integrated into the protocol architecture in a way that will not interfere with or be redundant to very similar security mechanism implemented in higher layers operating across the wide area network. A model for such mechanisms in the context of IEEE 802 LANs is proposed.
Preview
Unable to display preview. Download preview PDF.
References
Clark, D. D., “Policy Routing in Internet Protocols,” DARPA Internet Request for Comments (RFC) 1102, M.I.T. Laboratory for Computer Science, May 1989.
Digital Equipment Corp., VAX Key Distribution Center Security Manager's Guide, order no. AA-KM69A-TE, Maynard, Massachusetts, 1988.
Department of Defense, “Military Standard Internet Protocol,” MIL-STD-1777, August 1983.
Gasser, M., Building a Secure Computer System, Van Nostrand Reinhold Co., New York, 1988.
IEEE Standards 802.2 and 802.3, “IEEE Standards for Local Area Networks: Logical Link Control” and “Carrier Sense Multiple Access with Collision Detect (CSMA/CD),” ANSI/IEEE Std. 802.2 and 802.3, 1985, ISO DIS 8802.2; ISO IS 8802-3.
International Standards Organization, ISO 7498-2, Security Architecture.
Postel, J., “User Datagram Protocol,” Internet RFC 768, USC Information Sciences Institute, August 1980.
Saltzer, J.J., and Schroeder, M.D., “The Protection of Information in Computer Systems,” Proceedings of the IEEE, Vol. 63, No. 9, pp. 1278–1308, 1975.
Sun Microsystems, Inc., “NFS: Network File System protocol specification,” Internet RFC 1094, March 1989.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1989 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gasser, M. (1989). Access control and authentication in LANs. In: Berson, T.A., Beth, T. (eds) Local Area Network Security. LANSEC 1989. Lecture Notes in Computer Science, vol 396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-51754-5_28
Download citation
DOI: https://doi.org/10.1007/3-540-51754-5_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-51754-2
Online ISBN: 978-3-540-46802-8
eBook Packages: Springer Book Archive