Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

IEEE Network

Volume 1 Issue 2 • April 1987

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 1987, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (19950 KB)
    Freely Available from IEEE
  • [Front inside cover]

    Publication Year: 1987, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (925 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 1987, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (845 KB)
    Freely Available from IEEE
  • [Advertisements]

    Publication Year: 1987, Page(s):2 - 4
    Request permission for commercial reuse | PDF file iconPDF (37022 KB)
    Freely Available from IEEE
  • Guest editorial

    Publication Year: 1987, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1006 KB)

    Are computer and communications networks adequately protected from unauthorized access or misuse? Much information stored in computers and transmitted over the various communications networks that connect them represents valued property that is vulnerable to unauthorized access and disclosure, fraudulent manipulation, and disruption. Also, the expanding scope of networks for data communications in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commercial encryption

    Publication Year: 1987, Page(s):6 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2489 KB)

    Why Commercial Encryption? Encryption, long the province of the military and diplomatic communities, is becoming of vital importance in commercial communications as well [1,2,3]. The growing commercial interest in encryption can be traced to two basic trends: • The increased use of satellite, microwave, cellular mobile and other forms of radio communication which allow illicit interception ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Public key management for network security

    Publication Year: 1987, Page(s):11 - 16
    Cited by:  Papers (11)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4278 KB)

    New awareness of the value of information together with advances in modern state-of-the-art telecommunications technologies including personal computers, local area networks, distributed databases, packet radio, satellite teleconferencing, electronic mail, and electronic funds transfer, has caused a revolution in communications security affecting the commercial business sector. This revolution has... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic document authentication

    Publication Year: 1987, Page(s):17 - 23
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3548 KB)

    The increasing use of electronic transmission and storage of documents has given rise to new requirements for document security and authentication. In particular, it is necessary to consider schemes that provide at least the authenticity provided by traditional paper documents and written signatures, in order to extend these new techniques beyond the bounds of one individual and into the world of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network security: Protocol reference model and the trusted computer system evaluation criteria

    Publication Year: 1987, Page(s):24 - 33
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5031 KB)

    In 1983, the National Computer Security Center (NCSC) (formerly the DODCSC) published the Trusted Computer System Evaluation Criteria (TCSEC). The TCSEC was re-issued and slightly revised as a DoD standard in December 1985 [1]. During January 1986, the NCSC decided to begin work on a Trusted Network Guideline (TNG), which interprets the TCSEC and extends it as necessary for networks. The TNG is be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considerations for security in the OSI architecture

    Publication Year: 1987, Page(s):34 - 39
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2997 KB)

    Introduction to OSI Security The Open Systems Interconnection (OSI) computer network architecture has given computer network designers and implementors a common vocabulary and structure for building future networks. It has also given network security designers a foundation upon which desired security services can be defined and built. This article discusses several goals of security in the OSI arc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for papers: Special issues of IEEE network magazine

    Publication Year: 1987, Page(s): 40
    Request permission for commercial reuse | PDF file iconPDF (678 KB)
    Freely Available from IEEE
  • Technology perspective: Network security: Making the problem the solution

    Publication Year: 1987, Page(s): 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (586 KB)

    I know in my heart-of-hearts that computer security is important, but I have to admit that there are times when living with my company's security policies can be quite an annoyance. For example, my computer periodically insists that I change my password every few months. If I don't, it tells me “Password expired, choose a new one:” and forces me to select a password that is sufficien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IEEE network forum

    Publication Year: 1987, Page(s):42 - 43
    Request permission for commercial reuse | PDF file iconPDF (1040 KB)
    Freely Available from IEEE
  • Information infrastructure

    Publication Year: 1987, Page(s): 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    In this issue, I want to focus on one of the barriers which gets in the way of establishing a national information infrastructure. This particular barrier goes by many names, but the one which sticks in my mind most clearly is the term I heard first from Prof. Edward Feigenbaum, one of the founders of Artificial Intelligence. Prof. Feigenbaum referred to the “tyranny of the operating system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open systems standards

    Publication Year: 1987, Page(s): 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (683 KB)

    As described in the last issue, the new family of Open Systems Interconnection (OSI) standards is in an advanced state of maturity with the majority of key aspects either fully approved or near final approval. The family of OSI standards is made up of several components. The Basic Reference Model of OSI, as provided by the International Organization for Standardization in International Standard 74... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertiser's index

    Publication Year: 1987, Page(s):46 - 47
    Request permission for commercial reuse | PDF file iconPDF (731 KB)
    Freely Available from IEEE
  • Conference calendar

    Publication Year: 1987, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (524 KB)
    Freely Available from IEEE
  • [Back inside cover]

    Publication Year: 1987, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (2280 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 1987, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (4988 KB)
    Freely Available from IEEE

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Nei Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp