The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - February (1987 vol.13)
pp: 249-261
D. Estrin , Department of Computer Science, University of Southern California
ABSTRACT
Interorganization computer networks support person-to-person communication via electronic mail; exchange of cad/cam data, software modules, or documents via file transfer; input to an order-entry or accounting system via a database query and update protocol; and use of shared computational resources via an asynchronous message protocol or remote login. In most such interorganization arrangements, the set of resources that an organization wants to make accessible to outsiders is significantly smaller than the set of resources that it wants to remain strictly-internal (i.e., accessible to employees of the organization only). In addition, because the potential user is a person (or machine) outside the boundaries of the organization, the damage associated with undesired use can be high. Because of these characteristics, Interorganization Networks (ION's) have unique usage-control requirements.
INDEX TERMS
network security, Access control, authentication, network interconnection
CITATION
D. Estrin, "Controls for Interorganization Networks", IEEE Transactions on Software Engineering, vol.13, no. 2, pp. 249-261, February 1987, doi:10.1109/TSE.1987.233149
48 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool