Visa protocols for controlling interorganizational datagram flow

Abstract
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. Two visa protocols are presented and evaluated: one that requires distributed state information in gateways and one that uses additional encryptions instead of distributed state. Applications for such visa protocols include access control, accounting and billing for packet transit, and network resource management.

This publication has 14 references indexed in Scilit: