{"title":"A software design and implementation for filtering, forwarding and ciphering in a secure bridge","authors":"M. Soriano, F. Recacha, J. L. Melús","doi":"10.1109/CMPEUR.1992.218435","DOIUrl":null,"url":null,"abstract":"The authors present the development and the methodology to implement the software of a secure learning-bridge which has the ability to filter, to forward, and to cipher frames in an extended Ethernet environment. The implemented security system was basically built up with three subsystems. These were a management subsystem, a supervision center, and a set of secure bridges, whose functions were filtering the network data traffic and ciphering/deciphering the sensitive data. These devices, called CryptoNets, are described. The algorithm for data ciphering is discussed.<<ETX>>","PeriodicalId":390273,"journal":{"name":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","volume":"679 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CompEuro 1992 Proceedings Computer Systems and Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPEUR.1992.218435","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The authors present the development and the methodology to implement the software of a secure learning-bridge which has the ability to filter, to forward, and to cipher frames in an extended Ethernet environment. The implemented security system was basically built up with three subsystems. These were a management subsystem, a supervision center, and a set of secure bridges, whose functions were filtering the network data traffic and ciphering/deciphering the sensitive data. These devices, called CryptoNets, are described. The algorithm for data ciphering is discussed.<>