Distributed systems security

The increasing complexity of networking, and distributed information processing in particular, requires that greater attention be given to ensuring security within these systems. The heterogeneous nature of many cooperating inter-organisational systems, coupled with the strategic importance of inter-operability and inter-connectivity between those organizations has made the efficient and effective operation of security and other management functions essential. The need is to negotiate compatible global and local security policies which will ensure that the required levels of secure interaction are achieved. International standards developments are helping to establish the frameworks upon which such policies may be established. The implementation of such complex systems, however, introduces problems novel to users and systems designers alike. The level of integration necessary to achieve true open networking remains questionable.

[1]  Stephen M. Matyas,et al.  A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard , 1978, IBM Syst. J..

[2]  Stephen T. Kent,et al.  Security Mechanisms in High-Level Network Protocols , 1983, CSUR.

[3]  R. Jueneman,et al.  Message authentication , 1985, IEEE Communications Magazine.

[4]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[5]  Sead Muftic Security Mechanisms for Computer Networks , 1988, Comput. Networks.

[6]  Andrew S. Tanenbaum,et al.  Protection and Resource Control in Distributed Operating Systems , 1984, Comput. Networks.

[7]  Charles Cresson Wood,et al.  Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.

[8]  David K. Gifford Cryptographic sealing for information secrecy and authentication , 1982, CACM.

[9]  Butler W. Lampson,et al.  A Global Authentication Service without Global Trust , 1986, 1986 IEEE Symposium on Security and Privacy.

[10]  Thomas A. Berson,et al.  A key distribution protocol using event markers , 1983, TOCS.

[11]  David Alan Hanson,et al.  Data security , 1979, ACM-SE 17.

[12]  M.E. Hellman,et al.  Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.

[13]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[14]  Gerald J. Popek,et al.  Encryption and Secure Computer Networks , 1979, CSUR.

[15]  Philip Zimmermann,et al.  A Proposed Standard Format for RSA Cryptosystems , 1986, Computer.

[16]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[17]  Stephen M. Matyas,et al.  Generation, Distribution, and Installation of Cryptographic Keys , 1978, IBM Syst. J..

[18]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[19]  Whitfield Diffie,et al.  Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.

[20]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[21]  Andrew Birrell Secure communication using remote procedure calls , 1985, TOCS.

[22]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[23]  Stephen M. Matyas,et al.  Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems , 1982 .

[24]  Anita K. Jones Protection Mechanisms and the Enforcement of Security Policies , 1978, Advanced Course: Operating Systems.