Skip to main content

Computernetze

  • Chapter
Computersicherheit
  • 47 Accesses

Zusammenfassung

Dieses Zitat eines amerikanischen Sicherheitsexperten soll das hauptsächliche Sicherheitsproblem in einem Computernetz verdeutlichen. Das Problem entspringt der Unmöglichkeit, abschliessend sagen zu können, wer alles Zugang zu den in ein Netz eingebundenen Betriebsmitteln hat.

“You must always consider that you have two networks, the one you know about and the one you don’t know about.”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.95
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literaturverzeichnis

  1. Bauspiess, F. SELANE — AN Approach to Secure Networks. Abstracts of SECURICOM’90, Paris, 1990, 159–164.

    Google Scholar 

  2. Becker, W., Giller, G. Datensicherungs- und Datenschutzmassnahmen im ISDN. Datenschutz und Datensicherung, 9/1989, 437–439.

    Google Scholar 

  3. Th. Beth. Zur Sicherheit der Informationstechnik. Informatik-Spektrum 13 (1990), 204–215.

    Google Scholar 

  4. Beyer, T. Sicherheitsprobleme von Computernetzwerken. Informatik-Fachberichte 222, Springer-Verlag, 1989.

    Google Scholar 

  5. Clark, M.P. Networks and Telecommunications: Design and Operation. John Wiley & Sons, 1991.

    Google Scholar 

  6. Security Mechanisms for Computer Networks, Extended OSI Security Architecture. COST-11 Ter Project Report, Volume II, Draft, Oktober 1990.

    Google Scholar 

  7. Davies, D.W., Price, W.L. Security for Computer Networks. John Wiley & Sons, 1984.

    Google Scholar 

  8. Estrin, D., Tsudik, G. Secure control of transit internetwork traffic. Computer Networks and ISDN Systems 22, 1991, 363–382.

    Article  Google Scholar 

  9. Fumy, W., Landrock, P., Chaum, D., Jansen, C.J.A., Roelofsen, G., Vandewalle, J. Integrity Primitives for IBC. Proceedings of IWACA’92, 133–138.

    Google Scholar 

  10. Fumy, W., Leclerc, M. Integration of Key Management Protocols into the OSI Architecture. Proceedings of CS’90, Fondazione Ugo Bordini, 1991, 151–159.

    Google Scholar 

  11. Fumy, W., Riess, H.P. Network Security Management. Proceedings of IWACA’92, 139–146.

    Google Scholar 

  12. Horster, P., Knobloch, H.J. Sichere und authentische Kommunikation in Netzwerken. Proceedings der 21. Jahrestagung der GI, Springer-Verlag, 1991, 156–165.

    Google Scholar 

  13. Janson, P., Molva, R. Security in open networks and distributed systems.Computer Networks and ISDN Systems 22, 1991, 323–346.

    Google Scholar 

  14. Kauffels, F.J. Rechnernetzwerksystemarchitekturen und Datenkommunikation. B.I. Wissenschaftsverlag, 1989.8.3. ÖFFENTLICHE NETZE

    Google Scholar 

  15. Kohl, J., Neumann, C. The Kerberos Network Authentication Service. MIT Projekt Athena, Dezember 1990, verfügbar als /pub/kerberos/doc/V5DRAFT3-RFC.PS unter aftp auf athena-dist.mit.edu

    Google Scholar 

  16. Lippold, H., Schmitz, P. Sicherheit in netzgestützten Informationssystemen. Proceedings of SECUNET’90, Vieweg-Verlag, 1990.

    Google Scholar 

  17. Needham, R.M., Schroeder, M.D. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, Vol. 21 (1978), No. 12, 993–999.

    Article  MATH  Google Scholar 

  18. OSITOP Report Series Np. 3. Communications Security — Status and Standards. Prepared for OSITOP by Technology Appraisals Ltd, UK, 1991.

    Google Scholar 

  19. Pfitzmann, A., Pfitzmann, B., Waidner, M. Datenschutz garantierende offene Kommunikationsnetze. Informatik-Spektrum, 11 (1988), 118–142.

    Google Scholar 

  20. Pfitzmann, A. Dienstintegrierende Kommunikationsnetze mit teilnehmerüberprüfbarem Datenschutz. Springer-Verlag, 1990.

    Google Scholar 

  21. Sidhu, D.D. Authentication Protocols for Computer Networks. Computer Networks and ISDN Systems, 11, 1986, 297–310.

    Article  Google Scholar 

  22. Steiner, J., Neuman, C., Schiller, J. Kerberos: An Authentication Service for Open Network Systems. Project Athena, MIT, 1988.

    Google Scholar 

  23. Stallings, W. Data and Computer Communications. Macmillan Publishing Company, New York, 1988.

    Google Scholar 

  24. Tanenbaum, A.S. Computer-Netzwerke. Wolfram’s Fachverlag, 1990.

    Google Scholar 

  25. TEDIS Programme 1988–1989, Activity Report, Brüssel, 25. Juli 1990.

    Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden

About this chapter

Cite this chapter

Oppliger, R. (1992). Computernetze. In: Computersicherheit. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-87230-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-87230-2_8

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05296-6

  • Online ISBN: 978-3-322-87230-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics