By Topic

IEEE Network

Issue 3 • Date May-June 1997

Filter Results

Displaying Results 1 - 7 of 7
  • Network And Internet Security (Guest Editorial)

    Publication Year: 1997, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Security-enhanced mailing lists

    Publication Year: 1997, Page(s):30 - 33
    Cited by:  Papers (1)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    The Computer Center at the Technical University of Berlin (PRZ) has developed a security-enhanced mail exploder. It uses the well-known technology of public key cryptography to improve confidentiality and authenticity of a mailing list. One of the design goals was ease of use. No participant of a secure mailing list needs to know a public key of any other member; all a sender has to know is the pu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key derivation for network management applications

    Publication Year: 1997, Page(s):26 - 29
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    This article describes a key derivation method that greatly simplifies key distribution issues for network management (NM) applications and may in some cases relieve NM stations from the need to store any keys at all. This method is easily generalized for network protocols and applications where several “masters” need to talk to a large number of “slaves”. It shows a way to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Merging and extending the PGP and PEM trust models-the ICE-TEL trust model

    Publication Year: 1997, Page(s):16 - 24
    Cited by:  Papers (3)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2048 KB)

    The ICE-TEL project is a pan-European project which is building an Internet X.509-based certification infrastructure throughout Europe plus several secure applications that will use it. This article describes the trust model being implemented by the project. A trust model specifies the means by which a user may build trust in the assertion that a remote user is really who he purports to be (authen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The changing environment for security protocols

    Publication Year: 1997, Page(s):12 - 15
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    The systematic study of security protocols started, as far as the public literature is concerned, almost 20 years ago. A paper by M.D. Schroeder and the present writer may be taken as a specimen; it was written in 1977 and published in 1978. It was, of course, written against the background of the technology of the time and made various assumptions about the organizational context in which its tec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asynchronous transfer mode security

    Publication Year: 1997, Page(s):34 - 40
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB)

    It is envisioned that asynchronous transfer mode (ATM) will provide scalable and high-performance application-independent security services. The ATM Forum Security Working Group is currently developing its phase one security specification, which defines a number of security services for the ATM user plane and control plane. In addition, mechanisms for carrying security-related messages and require... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security issues in all-optical networks

    Publication Year: 1997, Page(s):42 - 48
    Cited by:  Papers (67)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (916 KB)

    All-optical networks are emerging as a promising technology for terabit per second class communications. However, they are intrinsically different from electro-optical networks, particularly because they do not regenerate signals in the network. The characteristics of all-optical network components and architectures manifest new and still unstudied security vulnerabilities but also offer a new arr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Nei Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp