A comprehensive security system- the concepts, agents and protocols

S. J. Shepherd, P. W. Sanders, A. Patel

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

This paper presents an overview of a comprehensive security architecture for use within, and as a value-added enhancement to, the ISO Open System Interconnection model. The system is arranged basically as an application layer service but can allow all of the ISO-recommended security facilities to be provided at any layer of the model. It is suitable as an "add-on" service to existing arrangements or can be fully integrated into new applications. For large-scale, distributed processing operations, a network of "security management centres" is suggested, that can help to ensure that system misuse is minimized, and that flexible operations are provided in an efficient manner.

Original languageEnglish
Pages (from-to)631-643
Number of pages13
JournalComputers and Security
Volume9
Issue number7
DOIs
Publication statusPublished - 1990
Externally publishedYes

Fingerprint

Security systems
Open systems
open system
interconnection
value added
Processing
management

Keywords

  • Agents
  • Computer networks
  • Policy
  • Protocols
  • Security
  • Security management

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

A comprehensive security system- the concepts, agents and protocols. / Shepherd, S. J.; Sanders, P. W.; Patel, A.

In: Computers and Security, Vol. 9, No. 7, 1990, p. 631-643.

Research output: Contribution to journalArticle

Shepherd, S. J. ; Sanders, P. W. ; Patel, A. / A comprehensive security system- the concepts, agents and protocols. In: Computers and Security. 1990 ; Vol. 9, No. 7. pp. 631-643.
@article{5d798987c7cc449ea82b5f31b261d330,
title = "A comprehensive security system- the concepts, agents and protocols",
abstract = "This paper presents an overview of a comprehensive security architecture for use within, and as a value-added enhancement to, the ISO Open System Interconnection model. The system is arranged basically as an application layer service but can allow all of the ISO-recommended security facilities to be provided at any layer of the model. It is suitable as an {"}add-on{"} service to existing arrangements or can be fully integrated into new applications. For large-scale, distributed processing operations, a network of {"}security management centres{"} is suggested, that can help to ensure that system misuse is minimized, and that flexible operations are provided in an efficient manner.",
keywords = "Agents, Computer networks, Policy, Protocols, Security, Security management",
author = "Shepherd, {S. J.} and Sanders, {P. W.} and A. Patel",
year = "1990",
doi = "10.1016/0167-4048(90)90062-X",
language = "English",
volume = "9",
pages = "631--643",
journal = "Computers and Security",
issn = "0167-4048",
publisher = "Elsevier Limited",
number = "7",

}

TY - JOUR

T1 - A comprehensive security system- the concepts, agents and protocols

AU - Shepherd, S. J.

AU - Sanders, P. W.

AU - Patel, A.

PY - 1990

Y1 - 1990

N2 - This paper presents an overview of a comprehensive security architecture for use within, and as a value-added enhancement to, the ISO Open System Interconnection model. The system is arranged basically as an application layer service but can allow all of the ISO-recommended security facilities to be provided at any layer of the model. It is suitable as an "add-on" service to existing arrangements or can be fully integrated into new applications. For large-scale, distributed processing operations, a network of "security management centres" is suggested, that can help to ensure that system misuse is minimized, and that flexible operations are provided in an efficient manner.

AB - This paper presents an overview of a comprehensive security architecture for use within, and as a value-added enhancement to, the ISO Open System Interconnection model. The system is arranged basically as an application layer service but can allow all of the ISO-recommended security facilities to be provided at any layer of the model. It is suitable as an "add-on" service to existing arrangements or can be fully integrated into new applications. For large-scale, distributed processing operations, a network of "security management centres" is suggested, that can help to ensure that system misuse is minimized, and that flexible operations are provided in an efficient manner.

KW - Agents

KW - Computer networks

KW - Policy

KW - Protocols

KW - Security

KW - Security management

UR - http://www.scopus.com/inward/record.url?scp=50849147053&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=50849147053&partnerID=8YFLogxK

U2 - 10.1016/0167-4048(90)90062-X

DO - 10.1016/0167-4048(90)90062-X

M3 - Article

AN - SCOPUS:50849147053

VL - 9

SP - 631

EP - 643

JO - Computers and Security

JF - Computers and Security

SN - 0167-4048

IS - 7

ER -