Communication security in a distributed network
- 1 January 1990
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGSAC Review
- Vol. 7 (4) , 1-6
- https://doi.org/10.1145/382089.382091
Abstract
In order for a distributed network to function securely, the integrity of the data transmitted over the communication links must be maintained. The use of either link encryption or end-to-end encryption will help to maintain the integrity of transmitted data, although there are differences in the level of security which they provide. This paper begins with an analysis of link encryption and end-to-end encryption. Five communication security goals are then described which concern the protection of transmitted data through the use of these encryption techniques.Keywords
This publication has 3 references indexed in Scilit:
- A survey of issues in computer network securityComputers & Security, 1986
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- Privacy and authentication: An introduction to cryptographyProceedings of the IEEE, 1979