• DocumentCode
    2372466
  • Title

    The MITRE security perimeter

  • Author

    Goldberg, David S.

  • Author_Institution
    Mitre Corp., USA
  • fYear
    1994
  • fDate
    5-9 Dec 1994
  • Firstpage
    212
  • Lastpage
    218
  • Abstract
    To protect MITRE´s unclassified computing resources from unauthorized use, MITRE maintains a network firewall between the MITRE corporate network and the Internet, and limits dial-in to three modem pools. The firewall limits Internet connectivity to a small set of computer systems called boundary hosts. The boundary hosts and the modem pools use a smartcard-based user authentication scheme to ensure that only authorized MITRE employees can gain access to the corporate network. The combination of firewall, boundary hosts, and modem pools is known as the MITRE security perimeter. The paper describes the design of the security perimeter and the integration of the smartcard system into the boundary hosts and modem pools
  • Keywords
    Internet; authorisation; internetworking; smart cards; Internet connectivity; MITRE corporate network; MITRE security perimeter; authorized MITRE employees; boundary hosts; computer systems; corporate network; dial-in; modem pools; network firewall; smartcard system; smartcard-based user authentication scheme; unauthorized use; unclassified computing resources; Authentication; Computer networks; IP networks; Internet; Joining processes; LAN interconnection; Local area networks; Modems; Protection; TCPIP;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Applications Conference, 1994. Proceedings., 10th Annual
  • Conference_Location
    Orlando, FL
  • Print_ISBN
    0-8186-6795-8
  • Type

    conf

  • DOI
    10.1109/CSAC.1994.367306
  • Filename
    367306