Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป X Through the Firewall, and Other Application Relays
Tweet

connect with us

X Through the Firewall, and Other Application Relays

Authors: 

G. Winfield Treese, MIT Laboratory for Computer Science and Digital Equipment Corporation and Alec Wolman, University of Washington and Digital Equipment Corporation

Abstract: 

Organizations often impose an administrative security policy when they co nnect to other organizations on a public network such as the Internet. Many applications have their own notions of security, or they simply rely on the security of the underlying protocols. Using the X Window System as a case study, we describe some techniques for building application-specic relays that allow the use of applications across organizational boundaries. In particular, we focus on analyzing administrative and application-specic security policies to construct solutions that satisfy the security requirements while providing the necessary functions of the applications.

G. Winfield Treese, MIT Laboratory for Computer Science and Digital Equipment Corporation

Alec Wolman, University of Washington and Digital Equipment Corporation

BibTeX
@inproceedings {260265,
author = {G. Winfield Treese and Alec Wolman},
title = {X Through the Firewall, and Other Application Relays},
booktitle = {USENIX Summer 1993 Technical Conference (USENIX Summer 1993 Technical Conference)},
year = {1993},
address = {Cincinnati, OH},
url = {https://www.usenix.org/conference/usenix-summer-1993-technical-conference/x-through-firewall-and-other-application-relays},
publisher = {USENIX Association},
month = jun,
}
Download

Links

Paper: 
http://usenix.org/publications/library/proceedings/cinci93/full_papers/treese.txt
  • Log in or    Register to post comments

© USENIX

  • Privacy Policy
  • Contact Us