Übersicht
Die engen Zusammenhänge zwischen Identif ikationsmechanismen und Abrechnungsstrategien werden aufgezeigt. Dabei werden Fragestellungen zusammengetragen, die in den bisherigen Arbeiten der ISO/ECMA zu den Themen Accounting Management und Security Management keine oder nur unzureichende Berücksichtigung fanden. Für die Beurteilung von Realisierungskonzepten für Identifikationsmechanismen werden Bewertungskriterien diskutiert.
Abstract
It will be shown that the design decisions concerning accounting and access control are strongly intertwined. Problems with regard to the areas of Accounting and Security Management are outlined that have not yet been dealt with by the standardization groups. Evaluation-citeria are discussed that concern implementation alternatives of accounting and identification mechanisms.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Literatur
COST: Management of Local Area Networks. Part II of Final Report of COST 11bis, LAN-Group, Oct.1984 edited by M. Sloman, Imperial College London
ECMA: ECMA/TC32/85/36 OSI-Directory: Access Service and Protocol Final Draft, February 1985
Fidlow, D.: A comprehensive approach to network security Data Communications, April 1985, p.195–213
GMD: Verschiedene Beiträge zu OSIS — Open Shops for Information Services In: Der QyiD-Spiegel 1/86
Hegering, H.-G.; Chylla, P.: Access Control and Accounting as Part of LAN-Management, Proceedings of EFOC-LAN, June 1986, Amsterdam
IEEE: Draft IEEE-Standard 802–1: Part B, Systems Management Rev.G, Febr. 1985
ISO-1: ISO/IC 97/SC 2l/WG I/N 391, ISO-OSI Basic Management Framework 6th Working Draft, Paris, Febr. 1985
ISO-2: ISO/TC 97/SC 2l/WG I/N 416, Addendum to ISO 7498 on Security Architecture Paris, Febr. 1985
ISO-3: ISO/ TC 97/SC2l/WG 16–4/N 384, Accounting Management Requirements, Working Draft, Paris, Febr. 1985
ISO-4: ISO/TC97/SC 2l/wG I/N 382, Procedures for Management Information Service Standardization, Working Draft, Paris, Febr. 1985
ISO-5: ISO/TC97/SC21/WG4/N117, Management Information Service Definition Part 4: Accounting Management Service Definition, Working Draft, November 1985
Kauffels, F.J.: Schwachstellen der Informationssicherheit in lokalen Netzen In: “Datenschutz und Datensicherheit im Wandel der Informationstechnologien” Informatik-Fachberichte 113, Springer-Verlag 1985, S.51–69
Schweitzer, J.A.: A Management View: Computer Security as a Discretionary Decision, Computers and Security 4 (1985), p. 13–22
Voydock, V.L.; Kent, St.T.: Security in High-Level Network Protocols IEEE Communication Magazine, Vol.23, No.7, July 1985, p.12–24
Wilbur, S.: Local area network management for distributed applications Computer Communications, Vol.9, No.2, 1986
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1987 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hegering, HG., Chylla, P. (1987). Benutzeridentifikation und Abrechnungsdienste in Einer Verteilten Systemumgebung. In: Gerner, N., Spaniol, O. (eds) Kommunikation in Verteilten Systemen. Informatik-Fachberichte, vol 130. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-71655-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-71655-3_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-17213-0
Online ISBN: 978-3-642-71655-3
eBook Packages: Springer Book Archive