By Topic

IEEE Network

Issue 6 • Date Nov.-Dec. 1999

Filter Results

Displaying Results 1 - 7 of 7
  • A survey of security issues in multicast communications

    Publication Year: 1999, Page(s):12 - 23
    Cited by:  Papers (88)  |  Patents (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1394 KB)

    The emergence and popularity of group-oriented applications on the World Wide Web has triggered a demand for scalable security solutions for group communication. One such solution, secure multicast is appealing because it leverages the efficiency of multicast data delivery. However, it also presents several research challenges, most notably in a group communication architecture, group key manageme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networking security [Guest Editorial]

    Publication Year: 1999, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • X.500 and LDAP security: a comparative overview

    Publication Year: 1999, Page(s):54 - 64
    Cited by:  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1112 KB)

    We give a comparative overview of the X.500 and LDAPv3 Directory security features. X.500 is a commonly used name for a series of joint ISO/IEC and ITU-T standards specifying a distributed directory service. It assumes the existence of an underlying OSI protocol stack. LDAP is an Internet alternative to the X.500 Directory Access Protocol (X.511 DAP). Since its first version LDAP has undergone sig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure remote access to an Internet Web server

    Publication Year: 1999, Page(s):31 - 37
    Cited by:  Papers (3)  |  Patents (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    We address the problem of secure remote access to a site's internal Web server from outside the firewall. The goal is to give authorized users access to sensitive information, while protecting the information from others. We implemented our solution using a one-time password scheme for client authentication and secure socket layer (SSL) for confidentiality. Our main design considerations were secu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview of PKI trust models

    Publication Year: 1999, Page(s):38 - 43
    Cited by:  Papers (84)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    If Alice and Bob each know their own private key and the other's public key, they can communicate securely, through any number of public key based protocols such as IPSec, PGP, S/MIME, or SSL. However, how do they know each other's public keys? The goal of a public key infrastructure (PKI) is to enable secure, convenient, and efficient discovery of public keys. It should be applicable within as we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On location-restricted services

    Publication Year: 1999, Page(s):44 - 52
    Cited by:  Papers (7)  |  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    Monitoring the location of user equipment is an important problem in many industries, including direct broadcasting satellites and others, where the physical location of the user determines the availability of the service or is crucial for the security or operation of the service. In this article we study four schemes for detecting the movement of user equipment, such as a set-top terminal, wirele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing ad hoc networks

    Publication Year: 1999, Page(s):24 - 30
    Cited by:  Papers (821)  |  Patents (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Neil Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp