Visa protocols for controlling interorganizational datagram flow
- 1 May 1989
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 7 (4) , 486-498
- https://doi.org/10.1109/49.17712
Abstract
The increasing use of internetworking protocols to connect administratively heterogeneous networks has raised the question of how an organization can control the flow of information across its network boundaries. One method for doing so is the use of visas, a cryptographic technique for authenticating and authorizing a flow of datagrams. Two visa protocols are presented and evaluated: one that requires distributed state information in gateways and one that uses additional encryptions instead of distributed state. Applications for such visa protocols include access control, accounting and billing for packet transit, and network resource management.Keywords
This publication has 14 references indexed in Scilit:
- Security issues in policy routingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- The first ten years of public-key cryptographyProceedings of the IEEE, 1988
- Interconnection Protocols for Interorganization NetworksIEEE Journal on Selected Areas in Communications, 1987
- Visa Scheme for Inter-Organization Network SecurityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Authentication revisitedACM SIGOPS Operating Systems Review, 1987
- Perspective on the ARPANET reference modelPublished by RFC Editor ,1982
- Internet ProtocolPublished by RFC Editor ,1981
- Internet Control Message ProtocolPublished by RFC Editor ,1981
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976