DocumentCode
2372466
Title
The MITRE security perimeter
Author
Goldberg, David S.
Author_Institution
Mitre Corp., USA
fYear
1994
fDate
5-9 Dec 1994
Firstpage
212
Lastpage
218
Abstract
To protect MITRE´s unclassified computing resources from unauthorized use, MITRE maintains a network firewall between the MITRE corporate network and the Internet, and limits dial-in to three modem pools. The firewall limits Internet connectivity to a small set of computer systems called boundary hosts. The boundary hosts and the modem pools use a smartcard-based user authentication scheme to ensure that only authorized MITRE employees can gain access to the corporate network. The combination of firewall, boundary hosts, and modem pools is known as the MITRE security perimeter. The paper describes the design of the security perimeter and the integration of the smartcard system into the boundary hosts and modem pools
Keywords
Internet; authorisation; internetworking; smart cards; Internet connectivity; MITRE corporate network; MITRE security perimeter; authorized MITRE employees; boundary hosts; computer systems; corporate network; dial-in; modem pools; network firewall; smartcard system; smartcard-based user authentication scheme; unauthorized use; unclassified computing resources; Authentication; Computer networks; IP networks; Internet; Joining processes; LAN interconnection; Local area networks; Modems; Protection; TCPIP;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Applications Conference, 1994. Proceedings., 10th Annual
Conference_Location
Orlando, FL
Print_ISBN
0-8186-6795-8
Type
conf
DOI
10.1109/CSAC.1994.367306
Filename
367306
Link To Document