Skip to main content

Basic Internet Security Model
draft-smart-sec-model-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Robert Smart
Last updated 2000-01-04 (Latest revision 2000-01-03)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

The first step in creating a secure Internet is to build a model of the security requirements of the real world entities involved and how those real world entities act on the Internet through the agency of networked computers. This document presents a minimal model as a starting point for discussion. In this model: o The real world is composed of entities, each being: (a) an independent legal entity; or (b) a sub-entity of another entity (creating a multi-level hierarchy). o Running code is characterized by: (a) the entity that it acts on behalf of; and (b) the entity that controls the environment in which the code executes. o The environment can run on a bare unmanaged machine or it can be a virtual environment which is code controlled by another entity. o We can model communication between machines as a sequence of requests and assertions. The security question becomes: which requests to honour. What is known about the provenance of the requests and assertions is typically crucial. o Security can take place at different network layers and security information must be passed between the layers along with the data.

Authors

Robert Smart

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)