Controls for Interorganization Networks
- 1 February 1987
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Software Engineering
- Vol. SE-13 (2), 249-261
- https://doi.org/10.1109/tse.1987.233149
Abstract
Interorganization computer networks support person-to-person communication via electronic mail; exchange of cad/cam data, software modules, or documents via file transfer; input to an order-entry or accounting system via a database query and update protocol; and use of shared computational resources via an asynchronous message protocol or remote login. In most such interorganization arrangements, the set of resources that an organization wants to make accessible to outsiders is significantly smaller than the set of resources that it wants to remain strictly-internal (i.e., accessible to employees of the organization only). In addition, because the potential user is a person (or machine) outside the boundaries of the organization, the damage associated with undesired use can be high. Because of these characteristics, Interorganization Networks (ION's) have unique usage-control requirements.Keywords
This publication has 5 references indexed in Scilit:
- Inter-organization networks: implications of access control: requirements for interconnection protocolPublished by Association for Computing Machinery (ACM) ,1986
- Non-Discretionary Controls for Inter-Organization NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- A security model for military message systemsACM Transactions on Computer Systems, 1984
- Non-Discretionery Controls for Commercial ApplicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978