Abstract
The most obvious threats to information security are those concerning data while being transmitted over a network. A secure network must provide for data confidentiality, for authentication of the originator of a message and for protection against unauthorized changes of the data transmitted. Since local area networks are not confined to small areas anymore, the need for LAN security also has become commonly recognized. Only a few vendors of networking equipment have responded yet to this need, also progress in network security standards is relatively slow.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Barker, L.K.; Kirkpatrick, K.E.: “The SILS Model for LAN Security”, Proceedings of 12th National Computer Security Conference, Baltimore, 1989, 267–276.
Diffie, W.; Hellman, M.E.: “New Directions in Cryptography”, IEEE Transactions on Information Theory, 22 (1976), 644–654.
Diffie, W.: “Security for the DoD Transmission Control Protocol”. Proceedings of Crypto'85, Springer LNCS 218 (1986), 108–127.
Fumy, W.; Leclerc, M.: “Integration of Key Management Protocols into the OSI Architecture”, Proceedings of CS'90: Symposium on Computer Security, Fondazione Ugo Bordoni (1991), 151–159.
Fumy, W.; Rieß, H.P.: “Local Area Network Security”, Proceedings of CS'90: Symposium on Computer Security, Fondazione Ugo Bordoni (1991), 145–150.
Herbison, B.J.: “Developing Ethernet Enhanced-Security System”, Proceedings of Crypto'88, Springer LNCS 403 (1990), 507–519.
Herbison, B.J.: “Low Cost Outboard Cryptographic Support for SILS and SP4.” Proceedings of 13th National Computer Security Conference, Baltimore, 1990, 286–295.
IEEE 802.10: “Standard for Interoperable LAN Security”, Draft 1/1990.
ISO International Standard 7498: “Open Systems Interconnection: Basic Reference Model”, 1983.
ISO International Standard 7498-2: “Open Systems Interconnection Reference Model — Part 2: Security Architecture”, 1988.
ISO/IEC Draft International Standard 10164-7: Security Management — Security Management Alarm Reporting, 1990.
ISO/IEC Committee Draft 10164-8: Security Management — Security Audit Trail Function, 1990.
ISO/IEC Draft International Standard 10181-2: Security Frameworks for Open Systems — Part 2: Authentication Framework, 1991.
ISO/IEC Committee Draft 10181-3: Security Frameworks for Open Systems — Part 3: Access Control, 1991.
ISO/IEC Committee Draft 10736: Transport Layer Security Protocol, 1990.
ISO/IEC Committee Draft 10745: Upper Layers Security Model, 1991.
Kirkpatrick, K.E.: “Standards for Network Security”, Proceedings of 11th National Computer Security Conference, Baltimore, 1988, 201–211.
Lambert, P.A.: “Architectural Model of the SDNS Key Management Protocol”, Proceedings of 11th National Computer Security Conference, Baltimore, 1988, 126–128.
Popek, G.J.; Kline, C.S.: “Encryption and Secure Computer Networks”, ACM Computing Surveys, 11 (1979), 331–356.
Ramaswamy, R.: “A Key Management Algorithm for Secure Communications in Open Systems Interconnection Architecture”, Computers & Security 9 (1990), 77–84.
Secure Data Network Systems: “Security protocol 4”, 7/1988.
Secure Data Network Systems: “Security protocol 3”, 2/1989.
Voydock, V.L.; Kent, S.T.: “Security in High Level Network Protocols”, IEEE Communications Magazine, July 1985, 12–24.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1993 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fumy, W. (1993). (Local area) network security. In: Preneel, B., Govaerts, R., Vandewalle, J. (eds) Computer Security and Industrial Cryptography. Lecture Notes in Computer Science, vol 741. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57341-0_64
Download citation
DOI: https://doi.org/10.1007/3-540-57341-0_64
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57341-8
Online ISBN: 978-3-540-48074-7
eBook Packages: Springer Book Archive