By Topic

IEEE Communications Magazine

Issue 9 • Date Sept. 1994

Filter Results

Displaying Results 1 - 9 of 9
  • Kerberos: an authentication service for computer networks

    Publication Year: 1994, Page(s):33 - 38
    Cited by:  Papers (296)  |  Patents (165)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1185 KB)

    When using authentication based on cryptography, an attacker listening to the network gains no information that would enable it to falsely claim another's identity. Kerberos is the most commonly used example of this type of authentication technology. The authors concentrate on authentication for real-time, interactive services that are offered on computer networks. They use the term real-time loos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access control: principle and practice

    Publication Year: 1994, Page(s):40 - 48
    Cited by:  Papers (177)  |  Patents (149)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2007 KB)

    Access control constrains what a user can do directly, as well as what programs executing on behalf of the users are allowed to do. In this way access control seeks to prevent activity that could lead to a breach of security. This article explains access control and its relationship to other security services such as authentication, auditing, and administration. It then reviews the access matrix m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network firewalls

    Publication Year: 1994, Page(s):50 - 57
    Cited by:  Papers (34)  |  Patents (201)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1124 KB)

    Computer security is a hard problem. Security on networked computers is much harder. Firewalls (barriers between two networks), when used properly, can provide a significant increase in computer security. The authors classify firewalls into three main categories: packet filtering, circuit gateways, and application gateways. Commonly, more than one of these is used at the same time. Their examples ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key escrowing today

    Publication Year: 1994, Page(s):58 - 68
    Cited by:  Papers (17)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2515 KB)

    The objective of the US Government's Escrowed Encryption Standard (EES) and associated Key Escrow System (KES) is to provide strong security for communications while simultaneously allowing authorized government access to particular communications for law enforcement and national security purposes. The article describes the EES and the KES. Particular emphasis is given to security, since potential... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward a national public key infrastructure

    Publication Year: 1994, Page(s):70 - 74
    Cited by:  Papers (8)  |  Patents (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB)

    Reliance on electronic communications makes information more vulnerable, and users will require confidentiality, message integrity, sender authentication, and sender non-repudiation. Public key cryptography will play an important role in providing these services.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital signatures: are they legal for electronic commerce?

    Publication Year: 1994, Page(s):76 - 80
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    In electronic commerce, like elsewhere, certain types of messages are inherently more sensitive than others. For example, a contract acceptance is more sensitive than a notice of goods delivery. One requires more integrity and assurance. One will be retained, the other discarded. In the paper-based world, signatures provide a degree of assurance for the more important messages. The means by which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing a global village and its resources

    Publication Year: 1994, Page(s):82 - 89
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    In an international economy and social infrastructure that is growing more dependent everyday on its communications networks, more attention must be placed on the security and integrity of the components and interfaces of those critical structures. This article describes and hopefully help to further set the stage for the realization of effective risk based baseline security level of protection an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The hidden benefits of optical transparency

    Publication Year: 1994, Page(s):90 - 97
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1514 KB)

    The optical fiber amplifier will bring about network transparency and reductions in manning levels, interface problems, software and operating costs, while improving reliability and performance. It is in the area of economics that optical transparency affords a unique opportunity. What is generally not recognized is that there is a raft of hidden benefits, specifically: major reductions in interfa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • All-optical signal processing in ultrahigh-speed optical transmission

    Publication Year: 1994, Page(s):98 - 105
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1767 KB)

    The coming broadband era will require very high-speed technologies that can handle more than 100-Gb/s for both transmission lines and transmission nodes. Novel all-optical signal processing technologies that offer unsurpassed performance are urgently required. This article briefly reviews the essential photonic technologies required for high-speed optical TDM transmission, including ultrashort opt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Magazine, considered by most to be their most important member benefit, provides timely information on all aspects of communications: monthly feature articles describe technology, systems, services, market trends, development methods, regulatory and policy issues, and significant global events.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Osman Gebizlioglu
Huawei Technologies