By Topic

Network, IEEE

Issue 2 • Date April 1987

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 1987, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (19950 KB)
    Freely Available from IEEE
  • [Front inside cover]

    Publication Year: 1987, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (925 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 1987, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (845 KB)
    Freely Available from IEEE
  • [Advertisements]

    Publication Year: 1987, Page(s):2 - 4
    Request permission for commercial reuse | PDF file iconPDF (37022 KB)
    Freely Available from IEEE
  • Guest editorial

    Publication Year: 1987, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1006 KB)

    Are computer and communications networks adequately protected from unauthorized access or misuse? Much information stored in computers and transmitted over the various communications networks that connect them represents valued property that is vulnerable to unauthorized access and disclosure, fraudulent manipulation, and disruption. Also, the expanding scope of networks for data communications in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commercial encryption

    Publication Year: 1987, Page(s):6 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2489 KB)

    The author discusses cryptographic privacy systems, in which the goal is to keep the content of the message secret. He describes public key encryption and offers some comments on its use. Factors affecting commercial use are examined. The author then describes the Data Encryption Standard (DES) and the impact of NASA's Commercial Commsec Endorsement Program algorithms on the DES. He concludes with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Public key management for network security

    Publication Year: 1987, Page(s):11 - 16
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4278 KB)

    A tutorial is given on two public key cryptographic systems that provide an alternative to classical cryptographic key management techniques: the RSA system and the SEEK system. The certification of public numbers is discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic document authentication

    Publication Year: 1987, Page(s):17 - 23
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3548 KB)

    Digital signature techniques such as the Rivest-Shamir-Adleman (RSA) scheme can be used to establish both the authenticity of a document and the identity of its originator. However, because of the computationally-intensive nature of the RSA algorithm, most digital signature schemes make use of a checksum technique to summarize or represent the document, and then digitally sign the checksum. Messag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network security: Protocol reference model and the trusted computer system evaluation criteria

    Publication Year: 1987, Page(s):24 - 33
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5031 KB)

    Issues arising from the application of the Trusted Computer System Evaluation Criteria (TCSEC) to networks are discussed, particularly those requiring further research. The focus is on how to integrate many of the concepts in the Open Systems Interconnection (OSI) security addendum into the framework of the TCSEC. The discussion covers the protocol architectural issues of the trusted network with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considerations for security in the OSI architecture

    Publication Year: 1987, Page(s):34 - 39
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2997 KB)

    The Open Systems Interconnection (OSI) computer network architecture has given computer network security designers a foundation on which desired security services can be defined and built. The author discusses several goal of security in the OSI architecture as well as where an how the security services that satisfy them could be implemented. He examines protocols for transport layer security serv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for papers: Special issues of IEEE network magazine

    Publication Year: 1987, Page(s): 40
    Request permission for commercial reuse | PDF file iconPDF (678 KB)
    Freely Available from IEEE
  • Technology perspective: Network security: Making the problem the solution

    Publication Year: 1987, Page(s): 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (586 KB)

    I know in my heart-of-hearts that computer security is important, but I have to admit that there are times when living with my company's security policies can be quite an annoyance. For example, my computer periodically insists that I change my password every few months. If I don't, it tells me “Password expired, choose a new one:” and forces me to select a password that is sufficien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IEEE network forum

    Publication Year: 1987, Page(s):42 - 43
    Request permission for commercial reuse | PDF file iconPDF (1040 KB)
    Freely Available from IEEE
  • Information infrastructure

    Publication Year: 1987, Page(s): 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    In this issue, I want to focus on one of the barriers which gets in the way of establishing a national information infrastructure. This particular barrier goes by many names, but the one which sticks in my mind most clearly is the term I heard first from Prof. Edward Feigenbaum, one of the founders of Artificial Intelligence. Prof. Feigenbaum referred to the “tyranny of the operating system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open systems standards

    Publication Year: 1987, Page(s): 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (683 KB)

    As described in the last issue, the new family of Open Systems Interconnection (OSI) standards is in an advanced state of maturity with the majority of key aspects either fully approved or near final approval. The family of OSI standards is made up of several components. The Basic Reference Model of OSI, as provided by the International Organization for Standardization in International Standard 74... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertiser's index

    Publication Year: 1987, Page(s):46 - 47
    Request permission for commercial reuse | PDF file iconPDF (731 KB)
    Freely Available from IEEE
  • Conference calendar

    Publication Year: 1987, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (524 KB)
    Freely Available from IEEE
  • [Back inside cover]

    Publication Year: 1987, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (2280 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 1987, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (4988 KB)
    Freely Available from IEEE

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Nei Kato
Tohoku University, Japan