Skip to main content

Considerations for security in the OSI architecture

  • Environment Of Telecommunications And Open Systems
  • Chapter
  • First Online:
Networking in Open Systems

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 248))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

VII. References

  1. ANSI X3.92, American National Standard for Information Systems — Data Encryption Algorithm, American National Standards Institute, New York, NY, 1981.

    Google Scholar 

  2. ANSI X3.105, American National Standard for Information Systems — Data Link Encryption, American National Standards Institute, New York, NY, 1983.

    Google Scholar 

  3. ANSI X3.106, American National Standard for Information Systems — Data Encryption Algorithm Modes of Operation, American National Standards Institute, New York, NY, 1983.

    Google Scholar 

  4. ANSI X9.8, American National Standard for PIN Management and Security, American National Standards Institute, New York, NY, 1982.

    Google Scholar 

  5. ANSI X9.9, American National Standard for Financial Institution Message Authentication — Wholesale, American National Standards Institute, New York, NY, 1986.

    Google Scholar 

  6. ANSI X9.17, American National Standard for Financial Institution Key Management — Wholesale, American National Standards Institute, New York, NY, 1985.

    Google Scholar 

  7. Federal Information Processing Standard 46: Data Encryption Standard (DES), National Bureau of Standards, Gaithersburg, MD, 1977.

    Google Scholar 

  8. Federal Information Processing Standard 74: Guidelines for Implementing and Using the Data Encryption Standard, National Bureau of Standards, Gaithersburg, MD, 1980.

    Google Scholar 

  9. Federal Information Processing Standard 81: DES Modes of Operation, National Bureau of Standards, Gaithersburg, MD, 1980.

    Google Scholar 

  10. Federal Information Processing Standard 113: Computer Data Authentication, National Bureau of Standards, Gaithersburg, MD, 1985.

    Google Scholar 

  11. ISO 7498: Proposed Draft Addendum Number 2–Security Architecture, ISO/ TC97/ SC21/ WG1, 1986.

    Google Scholar 

  12. The Directory — Authentication Framework, ISO/CCITT Directory Convergence Document #3, ISO/ TC97/ SC21/ WG4, 1986.

    Google Scholar 

  13. Transport Layer Protocol Definition for Providing Connection Oriented End-to-End Cryptographic Data Protection Using a 64-Bit Block Cipher, X3T1 Draft Document forwarded to ISO TC97/ SC20/ WG3, 1986.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Günter Müller Robert P. Blanc

Rights and permissions

Reprints and permissions

Copyright information

© 1987 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Branstad, D.K. (1987). Considerations for security in the OSI architecture. In: Müller, G., Blanc, R.P. (eds) Networking in Open Systems. Lecture Notes in Computer Science, vol 248. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0026954

Download citation

  • DOI: https://doi.org/10.1007/BFb0026954

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-17707-4

  • Online ISBN: 978-3-540-47777-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics