Skip to main content

(Local area) network security

  • Conference paper
  • First Online:
Computer Security and Industrial Cryptography

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 741))

  • 276 Accesses

Abstract

The most obvious threats to information security are those concerning data while being transmitted over a network. A secure network must provide for data confidentiality, for authentication of the originator of a message and for protection against unauthorized changes of the data transmitted. Since local area networks are not confined to small areas anymore, the need for LAN security also has become commonly recognized. Only a few vendors of networking equipment have responded yet to this need, also progress in network security standards is relatively slow.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Barker, L.K.; Kirkpatrick, K.E.: “The SILS Model for LAN Security”, Proceedings of 12th National Computer Security Conference, Baltimore, 1989, 267–276.

    Google Scholar 

  2. Diffie, W.; Hellman, M.E.: “New Directions in Cryptography”, IEEE Transactions on Information Theory, 22 (1976), 644–654.

    Google Scholar 

  3. Diffie, W.: “Security for the DoD Transmission Control Protocol”. Proceedings of Crypto'85, Springer LNCS 218 (1986), 108–127.

    Google Scholar 

  4. Fumy, W.; Leclerc, M.: “Integration of Key Management Protocols into the OSI Architecture”, Proceedings of CS'90: Symposium on Computer Security, Fondazione Ugo Bordoni (1991), 151–159.

    Google Scholar 

  5. Fumy, W.; Rieß, H.P.: “Local Area Network Security”, Proceedings of CS'90: Symposium on Computer Security, Fondazione Ugo Bordoni (1991), 145–150.

    Google Scholar 

  6. Herbison, B.J.: “Developing Ethernet Enhanced-Security System”, Proceedings of Crypto'88, Springer LNCS 403 (1990), 507–519.

    Google Scholar 

  7. Herbison, B.J.: “Low Cost Outboard Cryptographic Support for SILS and SP4.” Proceedings of 13th National Computer Security Conference, Baltimore, 1990, 286–295.

    Google Scholar 

  8. IEEE 802.10: “Standard for Interoperable LAN Security”, Draft 1/1990.

    Google Scholar 

  9. ISO International Standard 7498: “Open Systems Interconnection: Basic Reference Model”, 1983.

    Google Scholar 

  10. ISO International Standard 7498-2: “Open Systems Interconnection Reference Model — Part 2: Security Architecture”, 1988.

    Google Scholar 

  11. ISO/IEC Draft International Standard 10164-7: Security Management — Security Management Alarm Reporting, 1990.

    Google Scholar 

  12. ISO/IEC Committee Draft 10164-8: Security Management — Security Audit Trail Function, 1990.

    Google Scholar 

  13. ISO/IEC Draft International Standard 10181-2: Security Frameworks for Open Systems — Part 2: Authentication Framework, 1991.

    Google Scholar 

  14. ISO/IEC Committee Draft 10181-3: Security Frameworks for Open Systems — Part 3: Access Control, 1991.

    Google Scholar 

  15. ISO/IEC Committee Draft 10736: Transport Layer Security Protocol, 1990.

    Google Scholar 

  16. ISO/IEC Committee Draft 10745: Upper Layers Security Model, 1991.

    Google Scholar 

  17. Kirkpatrick, K.E.: “Standards for Network Security”, Proceedings of 11th National Computer Security Conference, Baltimore, 1988, 201–211.

    Google Scholar 

  18. Lambert, P.A.: “Architectural Model of the SDNS Key Management Protocol”, Proceedings of 11th National Computer Security Conference, Baltimore, 1988, 126–128.

    Google Scholar 

  19. Popek, G.J.; Kline, C.S.: “Encryption and Secure Computer Networks”, ACM Computing Surveys, 11 (1979), 331–356.

    Google Scholar 

  20. Ramaswamy, R.: “A Key Management Algorithm for Secure Communications in Open Systems Interconnection Architecture”, Computers & Security 9 (1990), 77–84.

    Google Scholar 

  21. Secure Data Network Systems: “Security protocol 4”, 7/1988.

    Google Scholar 

  22. Secure Data Network Systems: “Security protocol 3”, 2/1989.

    Google Scholar 

  23. Voydock, V.L.; Kent, S.T.: “Security in High Level Network Protocols”, IEEE Communications Magazine, July 1985, 12–24.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bart Preneel René Govaerts Joos Vandewalle

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fumy, W. (1993). (Local area) network security. In: Preneel, B., Govaerts, R., Vandewalle, J. (eds) Computer Security and Industrial Cryptography. Lecture Notes in Computer Science, vol 741. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57341-0_64

Download citation

  • DOI: https://doi.org/10.1007/3-540-57341-0_64

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57341-8

  • Online ISBN: 978-3-540-48074-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics