By Topic

Methodology for network security design

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Graft, D. ; Tellabs Inc., Lisle, IL, USA ; Pabrai, M. ; Pabrai, U.

A methodology for the design of network security based on the ISO 7498-2 security architecture is defined. The methodology enforces a problem-centered approach by explicitly defining separate specification, design, and implementation phases. In the specification phase, design constraints are identified and the required services are determined. In the design phase, the services are placed within the security architecture, the service primitives are defined, and the underlying service mechanisms and protocols are designed. In the implementation phase, a hardware and software solution is developed, the system is tested and verified, and required accreditation and certification are obtained. The methodology is illustrated by considering an application for an imaginary company. General conclusions regarding the feasibility of defining a network security methodology are presented

Published in:

Computers and Communications, 1990. Conference Proceedings., Ninth Annual International Phoenix Conference on

Date of Conference:

21-23 Mar 1990