Abstract
Internetworking is becoming the technology platform for a growing range of business uses. When you connect your local network to the Internet, the single most important measure you can take to prevent break-ins is to define a network security policy. In this work, we have examined- how one can provide a transparent network, while preserving security policy of organizations by implementing and maintaining strict access control using firewalls.
We propose a “User Access Domain (UAD)” to provide user-level grouping, and a “Access Domain Control Layer (ADCL)” to support the user level domain over the organizational networks with firewalls. While the User Access Domain provides the framework for virtual private networks the Access Domain Control Layer provides firewall-transparent TCP/UDP connectivity in what appears to be a seamless logical network spanning the User Access Domain. Moreover, the access-control policy can be formulated in more relevant terms like user identity, user role, source-destination, service etc. A proof-of-concept prototype is presently operational.
Preview
Unable to display preview. Download preview PDF.
References
W.R. Cheswick, S.M. Bellovin: Firewalls and Internet Security, P.306, Addison-Wesley Publishing (1994)
Marcus J. Ranum: Thinking about Firewalls, Proceedings of the Second World Conference on Systems and Network Security and Management (1993.4)
M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas, L. Jones: SOCKS Protocol Version 5, p.9, RFC1928 (1996.3)
Deborah Lynn Estrin: Access to Inter-Organization Computer Networks, MIT (1985)
J. Postel: Internet Protocol, p.45, RFC791 (1981.9)
C. Partridge: Mail routing and the domain system, p.7, RFC974 (1986.1)
Information technology — Open systems interconnection — The directory: Authentication framework, ITU-T X.509 (1993/11)
http://www.cup.hp.com/netperf/NetperfPage.html
http://www.ipa.go.jp/STC/ACCESS/FSOFT/
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Terada1, M., Murayama, Y. (1997). User Access Domain Management System-ADAMS. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027943
Download citation
DOI: https://doi.org/10.1007/BFb0027943
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63232-0
Online ISBN: 978-3-540-69237-9
eBook Packages: Springer Book Archive