首页> 外文学位 >SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION).
【24h】

SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION).

机译:计算机网络中的通信安全(密钥管理,验证)。

获取原文
获取原文并翻译 | 示例

摘要

This dissertation concerns investigations on two of the most important problems in establishing communication security in computer networks: (1) developing a model which precisely describes the mechanism that enforces the security policy and requirements for a secure network, and (2) designing a key management scheme for establishing a secure session for end-to-end encryption between a pair of communicants.; The security mechanism attempts to ensure secure flow of information between entities assigned to different security classes in different computer systems attached to a computer communication network. The mechanism also controls the accesses to the network devices by the subjects (users and processes executed on behalf of the users). The communication security problem is formulated by using a mathematical model which precisely describes the security requirements for the network.; The model integrates the notions of access control and information flow control to provide a Trusted Network Base (TNB) for the network. The demonstration of security of the network when the security mechanism is designed following the present model is given by using mathematical induction techniques.; The problem of designing key management schemes for establishing end-to-end encrypted sessions between source-destination pairs when the source and the destination are on different networks interconnected via Gateways and intermediate networks is examined. In such an internet environment, the key management problem attains a high degree of complexity due to the differences in the key distribution mechanisms used in the constituent networks and the infeasibility of effecting extensive hardware and software changes to the existing networks.; A hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between Authentication Servers and/or Control Centers of different networks at the higher levels. Details of this approach are discussed for specific illustrative scenarios to demonstrate the implementational simplicity. A formal verification of the security of the resulting system is also conducted by an axiomatic procedure utilizing certain combinatory logic principles. This approach is general and can be used for verifying the security of any existing key management scheme.
机译:本文涉及对计算机网络中建立通信安全性的两个最重要问题的调查:(1)开发一个模型,该模型精确地描述了实施安全策略和对安全网络的要求的机制;(2)设计密钥管理用于在一对通信者之间建立用于端到端加密的安全会话的方案;安全机制试图确保在连接到计算机通信网络的不同计算机系统中分配给不同安全类别的实体之间的信息流安全。该机制还控制主题(用户和代表用户执行的进程)对网络设备的访问。通过使用精确描述网络安全要求的数学模型来制定通信安全问题。该模型集成了访问控制和信息流控制的概念,以为网络提供可信网络库(TNB)。使用数学归纳技术给出了根据本模型设计安全机制时网络的安全性的演示。研究了当源和目标位于通过网关和中间网络互连的不同网络上时,用于在源-目标对之间建立端到端加密会话的密钥管理方案的设计问题。在这样的互联网环境中,由于组成网络中使用的密钥分发机制的差异以及对现有网络进行大量硬件和软件变更的不可行性,密钥管理问题变得高度复杂。提出了一种用于密钥管理的分层方法,该方法利用了较低级别的现有网络特定协议以及较高级别的不同网络的身份验证服务器和/或控制中心之间的协议。针对特定的说明性场景讨论了此方法的详细信息,以演示实现的简便性。使用某些组合逻辑原理的公理程序也可以对所得系统的安全性进行正式验证。这种方法是通用的,可用于验证任何现有密钥管理方案的安全性。

著录项

  • 作者

    LU, WEN-PAI.;

  • 作者单位

    The University of Arizona.;

  • 授予单位 The University of Arizona.;
  • 学科 Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 1986
  • 页码 282 p.
  • 总页数 282
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 无线电电子学、电信技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号