Issue No. 02 - February (1987 vol. 13)
D. Estrin , Department of Computer Science, University of Southern California
Interorganization computer networks support person-to-person communication via electronic mail; exchange of cad/cam data, software modules, or documents via file transfer; input to an order-entry or accounting system via a database query and update protocol; and use of shared computational resources via an asynchronous message protocol or remote login. In most such interorganization arrangements, the set of resources that an organization wants to make accessible to outsiders is significantly smaller than the set of resources that it wants to remain strictly-internal (i.e., accessible to employees of the organization only). In addition, because the potential user is a person (or machine) outside the boundaries of the organization, the damage associated with undesired use can be high. Because of these characteristics, Interorganization Networks (ION's) have unique usage-control requirements.
Communication system control, Computer networks, Access protocols, Authentication, Electronic mail, Communication system software, CADCAM, Communication system security, Data security, Control systems,network security, Access control, authentication, network interconnection
D. Estrin, "Controls for Interorganization Networks", IEEE Transactions on Software Engineering, vol. 13, no. , pp. 249-261, February 1987, doi:10.1109/TSE.1987.233149