[go: up one dir, main page]

Skip to main content

User Access Domain Management System-ADAMS

  • Security Models And Control
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Included in the following conference series:

  • 130 Accesses

Abstract

Internetworking is becoming the technology platform for a growing range of business uses. When you connect your local network to the Internet, the single most important measure you can take to prevent break-ins is to define a network security policy. In this work, we have examined- how one can provide a transparent network, while preserving security policy of organizations by implementing and maintaining strict access control using firewalls.

We propose a “User Access Domain (UAD)” to provide user-level grouping, and a “Access Domain Control Layer (ADCL)” to support the user level domain over the organizational networks with firewalls. While the User Access Domain provides the framework for virtual private networks the Access Domain Control Layer provides firewall-transparent TCP/UDP connectivity in what appears to be a seamless logical network spanning the User Access Domain. Moreover, the access-control policy can be formulated in more relevant terms like user identity, user role, source-destination, service etc. A proof-of-concept prototype is presently operational.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W.R. Cheswick, S.M. Bellovin: Firewalls and Internet Security, P.306, Addison-Wesley Publishing (1994)

    Google Scholar 

  2. Marcus J. Ranum: Thinking about Firewalls, Proceedings of the Second World Conference on Systems and Network Security and Management (1993.4)

    Google Scholar 

  3. M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas, L. Jones: SOCKS Protocol Version 5, p.9, RFC1928 (1996.3)

    Google Scholar 

  4. Deborah Lynn Estrin: Access to Inter-Organization Computer Networks, MIT (1985)

    Google Scholar 

  5. J. Postel: Internet Protocol, p.45, RFC791 (1981.9)

    Google Scholar 

  6. C. Partridge: Mail routing and the domain system, p.7, RFC974 (1986.1)

    Google Scholar 

  7. Information technology — Open systems interconnection — The directory: Authentication framework, ITU-T X.509 (1993/11)

    Google Scholar 

  8. http://www.cup.hp.com/netperf/NetperfPage.html

    Google Scholar 

  9. http://www.ipa.go.jp/STC/ACCESS/FSOFT/

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Terada1, M., Murayama, Y. (1997). User Access Domain Management System-ADAMS. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027943

Download citation

  • DOI: https://doi.org/10.1007/BFb0027943

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics