World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Policy Issues in Interconnecting Networks

By Leiner, B.

Click here to view

Book Id: WPLBN0000693143
Format Type: PDF eBook
File Size: 128.18 KB.
Reproduction Date: 2005

Title: Policy Issues in Interconnecting Networks  
Author: Leiner, B.
Volume:
Language: English
Subject: Accounting (Financial Record Keeping), Finance Management, Commerce
Collections: Technical eBooks Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Leiner, B. (n.d.). Policy Issues in Interconnecting Networks. Retrieved from http://hawaiilibrary.net/


Description
Technical Reference Publication

Excerpt
Excerpt: Policy Issues in Interconnecting Networks Status of This Memo: To support the activities of the Federal Research Internet Coordinating Committee (FRICC) in creating an interconnected set of networks to serve the research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. Held under the auspice f the Internet Activities Board at the request of the FRICC, and sponsored by NASA a through RIACS, the workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection. The purpose of this RFC is to report the results of these workshops. Distribution of this memo is unlimited. Status of this memo to support the activities of the Federal Research Internet Coordinating Committee (FRICC) in creating an interconnected set of networks to serve th research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. Held under the auspice f the Internet Activities Board at the request of the FRICC, and sponsored by NASA through RIACS, the workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection.

Table of Contents
TABLE OF CONTENTS 1. Introduction ......................................................................................................... 1 2.Workshop Summary ........................................................................................... 3 3. Working Group on Interconnection Policies .....................................................9 3.1. Existing Policies, Summarized ........................................................................ 10 3.2. Refined Policy Statements ............................................................................... 11 4.Access Control for Network Switching and Transmission Resources ............. 14 4.1. Introduction ...................................................................................................... 14 4.2 Access Control Policy Issues .......................................................................... 15 4.2.1. Policies and Models ..................................................................................... 15 4.2.2. Policy Inputs ................................................................................................. 16 4.3. Communication Scenarios ............................................................................... 18 4.3.1. Connection-Oriented Communication .......................................................... 18 4.3.2. Variations on Connection-Oriented Scenarios ............................................. 19 4.3.3. Electronic Messaging ................................................................................... 20 4.3.4. Transaction-Oriented Communication ......................................................... 21 4.3.5. Multicast Communication ............................................................................ 21 4.4. Access Control Architectures .......................................................................... 2 .4.1. Analogies with Operating System Security ................................................. 22 4.4.2. Clark?s Policy Routing Model and Access Control .................................... 23 4.4.3. Clark?s Architecture in Retrospect ............................................................... 26 4.4.4. Trust Implications and Possible Remedies .................................................. 27 5.Resource Sharing ................................................................................................ 30 5.1. Introduction ...................................................................................................... 30 5.2. Service Class .................................................................................................... 30 5.3. User Categories ................................................................................................ 31 5.4. Additional Discussion ...................................................................................... 32 5.4.1. Accounting for usage: .................................................................................. 32 5.4.2. Levels of assurance: ..................................................................................... 32 5.4.3. Global effects: ............................................................................................... 33 5.5. Conclusions ...................................................................................................... 34 5.6. Recommendations ............................................................................................ 34 5.6.1. Instant projects .............................................................................................. 35 5.6.2. Short-term experiments ................................................................................ 35 5.6.3. Longer-term experiments ............................................................................. 36 6. End-to-End Security Services ............................................................................ 38 6.1. Introduction ...................................................................................................... 38 6.2. Multi-administrative Security Architecture .................................................... 38 6.2.1. Security Domains ......................................................................................... 40

 

Click To View

Additional Books


  • Book-Keeping, By R. G. C. Hamilton and J... (by )
  • Book-Keeping, By R. G. C. Hamilton and J... (by )
  • Book-Keeping, By R. G. C. Hamilton and J... (by )
  • The Books of David Lindsay and Son, Merc... (by )
  • Balance-Sheet of the World for Ten Years... (by )
  • Book-Keeping Primer (by )
  • Book-Keeping by Single and Double Entry ... (by )
  • Book-Keeping Simplified, For Common Scho... (by )
  • Bookkeeping and Accounting Exercises (by )
  • Bookkeeping and Accounting Exercises (by )
  • Bookkeeping and Accounting Exercises (by )
  • Business Bookkeeping and Practice (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.