NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING.

David J. Farber, Kenneth C. Larson

Research output: Contribution to conferencePaperpeer-review

12 Citations (Scopus)

Abstract

With the experience gained from investigations of a uniform process oriented addressing mechanism, it is reasonable to ask what additional capabilities such addressing structures given the designer. Of particular interest are systems which provide a uniform interprocess intercommunication capability which utilizes an addressing mechanism based on process addressing rather than on the normal machine orientated addressing scheme. The protocol presented is designed to operate within a network consisting of reasonably secure hosts, secure communications processors which interface the hosts to the network, and highly vulnerable communications links. Security is achieved by a dynamic process renaming scheme which is centered in the communications processors. Dynamic renaming is achieved by mutually agreed upon algorithms which generate the names and sequencing keys contained in the messages. The analysis of the protocol using a technique which provides a means of certifying prior to implementation that a protocol exhibits specific characteristics of message flow is presented.

Original languageEnglish
Pages8. 13-8. 18
Publication statusPublished - 1975
Externally publishedYes
EventData Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ - Quebec City, Que, USA
Duration: 1975 Oct 71975 Oct 9

Other

OtherData Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ
CityQuebec City, Que, USA
Period75/10/775/10/9

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING.'. Together they form a unique fingerprint.

Cite this