DocumentCode :
2562087
Title :
Network Security Overview
Author :
Walker, Stephen T.
Author_Institution :
Trusted Information Systems, lnc.
fYear :
1985
fDate :
22-24 April 1985
Firstpage :
62
Lastpage :
62
Abstract :
Much attention developing trusted criteria. Before has recently been focused on computer network evaluation attempting this however, a better understanding of the relationship between individual trusted computers and networks that link them is required. This paper provides an overall system view of the network and trusted and untrusted computers attached to it, and how various ways of protecting data on networks affect which portions of the network must be trusted and what security policy must be enforced. By examining several network models will become apparent where new or additional criteria need to be developed.
Keywords :
Access control; Computational modeling; Computers; Operating systems; Process control; Wires;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1985 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
ISSN :
1540-7993
Print_ISBN :
0-8186-0629-0
Type :
conf
DOI :
10.1109/SP.1985.10002
Filename :
6234837
Link To Document :
بازگشت