Skip to main content

Access control and authentication in LANs

  • Section I: Architecture
  • Conference paper
  • First Online:
Local Area Network Security (LANSEC 1989)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 396))

Included in the following conference series:

  • 159 Accesses

Abstract

This paper explores the uses for security mechanisms confined to OSI layer 2, even in LANs that also employ wide area protocols up through layer 7. These mechanisms must be integrated into the protocol architecture in a way that will not interfere with or be redundant to very similar security mechanism implemented in higher layers operating across the wide area network. A model for such mechanisms in the context of IEEE 802 LANs is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clark, D. D., “Policy Routing in Internet Protocols,” DARPA Internet Request for Comments (RFC) 1102, M.I.T. Laboratory for Computer Science, May 1989.

    Google Scholar 

  2. Digital Equipment Corp., VAX Key Distribution Center Security Manager's Guide, order no. AA-KM69A-TE, Maynard, Massachusetts, 1988.

    Google Scholar 

  3. Department of Defense, “Military Standard Internet Protocol,” MIL-STD-1777, August 1983.

    Google Scholar 

  4. Gasser, M., Building a Secure Computer System, Van Nostrand Reinhold Co., New York, 1988.

    Google Scholar 

  5. IEEE Standards 802.2 and 802.3, “IEEE Standards for Local Area Networks: Logical Link Control” and “Carrier Sense Multiple Access with Collision Detect (CSMA/CD),” ANSI/IEEE Std. 802.2 and 802.3, 1985, ISO DIS 8802.2; ISO IS 8802-3.

    Google Scholar 

  6. International Standards Organization, ISO 7498-2, Security Architecture.

    Google Scholar 

  7. Postel, J., “User Datagram Protocol,” Internet RFC 768, USC Information Sciences Institute, August 1980.

    Google Scholar 

  8. Saltzer, J.J., and Schroeder, M.D., “The Protection of Information in Computer Systems,” Proceedings of the IEEE, Vol. 63, No. 9, pp. 1278–1308, 1975.

    Google Scholar 

  9. Sun Microsystems, Inc., “NFS: Network File System protocol specification,” Internet RFC 1094, March 1989.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Thomas A. Berson Thomas Beth

Rights and permissions

Reprints and permissions

Copyright information

© 1989 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gasser, M. (1989). Access control and authentication in LANs. In: Berson, T.A., Beth, T. (eds) Local Area Network Security. LANSEC 1989. Lecture Notes in Computer Science, vol 396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-51754-5_28

Download citation

  • DOI: https://doi.org/10.1007/3-540-51754-5_28

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-51754-2

  • Online ISBN: 978-3-540-46802-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics