{"title":"将安全性应用到SMDS:一个实际示例","authors":"Paola Fulchignoni, Giovanni Marrota, A. J. Wiley","doi":"10.1109/INFCOM.1993.253407","DOIUrl":null,"url":null,"abstract":"The need for secure data exchange within the public Switched Multimegabit Data Service (SMDS) environment is addressed by applying the IEEE 802.10 Secure Data Exchange (SDE) protocol. A result of this study has been the implementation of an efficient protection mechanism for information transfer over the public SMDS network, providing security against unauthorized disclosure, data modification, masquerading attacks, and unauthorized access to resources. A security and key management system, consisting of applications and protocols, has also been provided. This has been used for configuring security system attributes such as cryptographic keys, session keys, and security flags, and for the supervision of the SDE protocol and the maintenance of local secure management information bases.<<ETX>>","PeriodicalId":166966,"journal":{"name":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Applying security to SMDS: a practical example\",\"authors\":\"Paola Fulchignoni, Giovanni Marrota, A. J. Wiley\",\"doi\":\"10.1109/INFCOM.1993.253407\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The need for secure data exchange within the public Switched Multimegabit Data Service (SMDS) environment is addressed by applying the IEEE 802.10 Secure Data Exchange (SDE) protocol. A result of this study has been the implementation of an efficient protection mechanism for information transfer over the public SMDS network, providing security against unauthorized disclosure, data modification, masquerading attacks, and unauthorized access to resources. A security and key management system, consisting of applications and protocols, has also been provided. This has been used for configuring security system attributes such as cryptographic keys, session keys, and security flags, and for the supervision of the SDE protocol and the maintenance of local secure management information bases.<<ETX>>\",\"PeriodicalId\":166966,\"journal\":{\"name\":\"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1993-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFCOM.1993.253407\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFCOM.1993.253407","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The need for secure data exchange within the public Switched Multimegabit Data Service (SMDS) environment is addressed by applying the IEEE 802.10 Secure Data Exchange (SDE) protocol. A result of this study has been the implementation of an efficient protection mechanism for information transfer over the public SMDS network, providing security against unauthorized disclosure, data modification, masquerading attacks, and unauthorized access to resources. A security and key management system, consisting of applications and protocols, has also been provided. This has been used for configuring security system attributes such as cryptographic keys, session keys, and security flags, and for the supervision of the SDE protocol and the maintenance of local secure management information bases.<>