Published: September 20, 1993
Author(s)
Wayne Jansen (NIST), Dale Walters (NIST)
Conference
Name: 16th National Computer Security Conference
Dates: 09/20/1993 - 09/23/1993
Location: Baltimore, Maryland, United States
Citation: Proceedings of the 16th National Computer Security Conference, pp. 216-225
Within the last year, several security protocols pertaining to the lower layers of the OSI reference model have emerged from the international standardization process. These standards offer similar, but not identical, security services for the transport, network, and data link layers. This paper attempts to distinguish each security protocol from the others in terms of the subtle differences that may be important, but not obvious, to a potential user. It also provides guidelines concerning the environments for which each protocol is best suited. Based on the organizational protection policy and the information provided here, individuals can better select the security protocol most appropriate for their requirements.
Within the last year, several security protocols pertaining to the lower layers of the OSI reference model have emerged from the international standardization process. These standards offer similar, but not identical, security services for the transport, network, and data link layers. This paper...
See full abstract
Within the last year, several security protocols pertaining to the lower layers of the OSI reference model have emerged from the international standardization process. These standards offer similar, but not identical, security services for the transport, network, and data link layers. This paper attempts to distinguish each security protocol from the others in terms of the subtle differences that may be important, but not obvious, to a potential user. It also provides guidelines concerning the environments for which each protocol is best suited. Based on the organizational protection policy and the information provided here, individuals can better select the security protocol most appropriate for their requirements.
Hide full abstract
Keywords
data link layer; network layer; OSI reference model; security protocol; transport layer
Control Families
None selected