Skip to main content

Trust in Cyberspace (1999) / Chapter Skim
Currently Skimming:

Appendix K: Glossary
Pages 300-318

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 300...
... Access level is either the clearance level associated with a subject or the classification level associated with an object. ACE (access control list)
From page 301...
... was a federally funded project that achieved full end-to-end packet encryption, with full header bypass, in working prototype form in the mid to late 1970s. Bell and La Padula policy is a security policy prohibiting information flow from one object to another with a lesser or incomparable classification.
From page 302...
... CCv2 refers to Common Criteria, version 2. CDIS (central control function display information system)
From page 303...
... Clipper chip is an escrowed encryption chip that implements the Skipjack algorithm to encrypt communications conducted over the public switched network (e.g., between telephones, modems, or fax equipment)
From page 304...
... DON (defense data network) is a global DOD communications network composed of MILNET, other portions of the Internet, and classified networks.
From page 305...
... DVRP (distance vector routing protocol) enables routers to function without complete knowledge of network topology.
From page 306...
... FTP (File Transfer Protocol) is a client-server protocol that enables a user on one computer to transfer files to and from another computer over a TCP/IP network.
From page 307...
... Integrity check is a quantity derived by an algorithm from the running digital stream of a message, or the entire contents of a stored data file, and appended to it. Some integrity checks are cryptographically based.
From page 308...
... Java is an object-oriented, distributed, architecture-neutral, portable, general-purpose programming language. lavaBeans is a component architecture for lava that enables the development of reusable software components that can be assembled using visual application-builder tools.
From page 309...
... is an NSA initiative designed to provide a framework for the development of interoperable, complementary security products. Multics is a multiuser operating system developed in the mid-1960s by MIT, GE, and Bell Laboratories that features elaborate access controls.
From page 310...
... is the new name of the former Network Reliability Council. NSA is the National Security Agency, which is part of the DOD.
From page 311...
... is a standard interior gateway routing protocol for the Internet. It is a link-state routing protocol, as distinct from a distance-vector routing protocol.
From page 312...
... Private key is the decryption or signature generation key associated with a given person's public key for a public-key cryptographic system. Protocols are formal rules describing how different parties cooperate to share or exchange data, especially across a network.
From page 313...
... Red Book is the common name for the DOD document containing the trusted network interpretation of the trusted computer system evaluation criteria. Reliability is the capability of a computer, or information or telecommunications system, to perform consistently and precisely according to its specifications and design requirements, and to do so with high confidence.
From page 314...
... Security typically encompasses secrecy, confidentiality, integrity, and availability and is intended to ensure that a system resists potentially correlated attacks. Security level is either the clearance level associated with a subject or a classification level associated with an object.
From page 315...
... SSL (secure socket layer) is a protocol designed to provide secure communications for HTTP traffic on the Internet.
From page 316...
... is an Ethernet LAN data encryption product. Trojan horse refers to a program that, by exploiting the current user's authorization, provides covert access to information in an object for a user not authorized to access that object.
From page 317...
... WWW is the World Wide Web. X.25 is a standard protocol suite for the DTE-DCE interface in a packetswitched network.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.