NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING.

David Farber, Kenneth C. Larson

Research output: Contribution to conferencePaper

Abstract

With the experience gained from investigations of a uniform process oriented addressing mechanism, it is reasonable to ask what additional capabilities such addressing structures given the designer. Of particular interest are systems which provide a uniform interprocess intercommunication capability which utilizes an addressing mechanism based on process addressing rather than on the normal machine orientated addressing scheme. The protocol presented is designed to operate within a network consisting of reasonably secure hosts, secure communications processors which interface the hosts to the network, and highly vulnerable communications links. Security is achieved by a dynamic process renaming scheme which is centered in the communications processors. Dynamic renaming is achieved by mutually agreed upon algorithms which generate the names and sequencing keys contained in the messages. The analysis of the protocol using a technique which provides a means of certifying prior to implementation that a protocol exhibits specific characteristics of message flow is presented.

Original languageEnglish
Publication statusPublished - 2017 Jan 1
Externally publishedYes
EventData Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ - Quebec City, Que, USA
Duration: 1975 Oct 71975 Oct 9

Other

OtherData Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ
CityQuebec City, Que, USA
Period75/10/775/10/9

Fingerprint

Network security
Telecommunication links
Communication
Secure communication

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Farber, D., & Larson, K. C. (2017). NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING.. Paper presented at Data Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ, Quebec City, Que, USA, .

NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING. / Farber, David; Larson, Kenneth C.

2017. Paper presented at Data Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ, Quebec City, Que, USA, .

Research output: Contribution to conferencePaper

Farber, D & Larson, KC 2017, 'NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING.' Paper presented at Data Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ, Quebec City, Que, USA, 75/10/7 - 75/10/9, .
Farber D, Larson KC. NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING.. 2017. Paper presented at Data Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ, Quebec City, Que, USA, .
Farber, David ; Larson, Kenneth C. / NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING. Paper presented at Data Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ, Quebec City, Que, USA, .
@conference{d1fa2476893b44c9b3b60571235c1cce,
title = "NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING.",
abstract = "With the experience gained from investigations of a uniform process oriented addressing mechanism, it is reasonable to ask what additional capabilities such addressing structures given the designer. Of particular interest are systems which provide a uniform interprocess intercommunication capability which utilizes an addressing mechanism based on process addressing rather than on the normal machine orientated addressing scheme. The protocol presented is designed to operate within a network consisting of reasonably secure hosts, secure communications processors which interface the hosts to the network, and highly vulnerable communications links. Security is achieved by a dynamic process renaming scheme which is centered in the communications processors. Dynamic renaming is achieved by mutually agreed upon algorithms which generate the names and sequencing keys contained in the messages. The analysis of the protocol using a technique which provides a means of certifying prior to implementation that a protocol exhibits specific characteristics of message flow is presented.",
author = "David Farber and Larson, {Kenneth C.}",
year = "2017",
month = "1",
day = "1",
language = "English",
note = "Data Commun Symp, 4th, Proc, Network Struct in an Evol Oper Environ ; Conference date: 07-10-1975 Through 09-10-1975",

}

TY - CONF

T1 - NETWORK SECURITY VIA DYNAMIC PROCESS RENAMING.

AU - Farber, David

AU - Larson, Kenneth C.

PY - 2017/1/1

Y1 - 2017/1/1

N2 - With the experience gained from investigations of a uniform process oriented addressing mechanism, it is reasonable to ask what additional capabilities such addressing structures given the designer. Of particular interest are systems which provide a uniform interprocess intercommunication capability which utilizes an addressing mechanism based on process addressing rather than on the normal machine orientated addressing scheme. The protocol presented is designed to operate within a network consisting of reasonably secure hosts, secure communications processors which interface the hosts to the network, and highly vulnerable communications links. Security is achieved by a dynamic process renaming scheme which is centered in the communications processors. Dynamic renaming is achieved by mutually agreed upon algorithms which generate the names and sequencing keys contained in the messages. The analysis of the protocol using a technique which provides a means of certifying prior to implementation that a protocol exhibits specific characteristics of message flow is presented.

AB - With the experience gained from investigations of a uniform process oriented addressing mechanism, it is reasonable to ask what additional capabilities such addressing structures given the designer. Of particular interest are systems which provide a uniform interprocess intercommunication capability which utilizes an addressing mechanism based on process addressing rather than on the normal machine orientated addressing scheme. The protocol presented is designed to operate within a network consisting of reasonably secure hosts, secure communications processors which interface the hosts to the network, and highly vulnerable communications links. Security is achieved by a dynamic process renaming scheme which is centered in the communications processors. Dynamic renaming is achieved by mutually agreed upon algorithms which generate the names and sequencing keys contained in the messages. The analysis of the protocol using a technique which provides a means of certifying prior to implementation that a protocol exhibits specific characteristics of message flow is presented.

UR - http://www.scopus.com/inward/record.url?scp=0016867208&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0016867208&partnerID=8YFLogxK

M3 - Paper

AN - SCOPUS:0016867208

ER -