Skip to main content

Design issues for secure computer networks

  • Chapter 3.: Issues And Results In The Design Of Operating Systems
  • Chapter
  • First Online:
Operating Systems

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 60))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

8. Bibliography

  • Branstedt,D., Security Aspects of Computer Networks, AIAA Computer Networks Conference, April 1973.

    Google Scholar 

  • Diffie, W. and M. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, November 1976, 644–654.

    Google Scholar 

  • Evans, A. et. al., A User Authentication Scheme Not Requiring Secrecy in the Computer, CACM Vol. 17 No. 8, August 1977, pp437–441.

    Google Scholar 

  • Gaines, R. S. private communication, September 1977.

    Google Scholar 

  • Kent, S. Encryption-based Protection Protocols for Interactive User-Computer Communication, Laboratory for Computer Science, MIT, TR 162, 1976.

    Google Scholar 

  • National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standards Publication 46, January 1977.

    Google Scholar 

  • Needham, R. and M. Schroeder, Security and Authentication in Large Networks of Computers, Xerox Palo Alto Research Center Technical Report, September 1977.

    Google Scholar 

  • Rabin, M. "Digital Signatures Using Conventional Encryption Algorithms, Proceedings of the Conference on Fundamentals of Secure Computing, Atlanta Georgia, October 3–5, 1977 Academic Press (to appear).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

R. Bayer R. M. Graham G. Seegmüller

Rights and permissions

Reprints and permissions

Copyright information

© 1978 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Popek, G.J., Kline, C.S. (1978). Design issues for secure computer networks. In: Bayer, R., Graham, R.M., Seegmüller, G. (eds) Operating Systems. Lecture Notes in Computer Science, vol 60. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-08755-9_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-08755-9_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-08755-7

  • Online ISBN: 978-3-540-35880-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics