This HTML5 document contains 39 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n10https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbchttp://dbpedia.org/resource/Category:
dbphttp://dbpedia.org/property/
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Simon_S._Lam
dbo:wikiPageWikiLink
dbr:Secure_Network_Programming
dbp:knownFor
dbr:Secure_Network_Programming
dbo:knownFor
dbr:Secure_Network_Programming
Subject Item
dbr:Transport_Layer_Security
dbo:wikiPageWikiLink
dbr:Secure_Network_Programming
Subject Item
dbr:ACM_Software_System_Award
dbo:wikiPageWikiLink
dbr:Secure_Network_Programming
Subject Item
dbr:La_Salle_College
dbo:wikiPageWikiLink
dbr:Secure_Network_Programming
Subject Item
dbr:SNP
dbo:wikiPageWikiLink
dbr:Secure_Network_Programming
dbo:wikiPageDisambiguates
dbr:Secure_Network_Programming
Subject Item
dbr:Secure_Network_Programming
rdfs:label
Secure Network Programming
rdfs:comment
Secure Network Programming (SNP) is a prototype of the first Secure Sockets Layer, designed and built by the Networking Research Laboratory at the University of Texas at Austin, led by Simon S. Lam. This work was published in the 1994 USENIX Summer Technical conference. For this project, the authors won the 2004 ACM Software System Award. The paper presented on June 8, 1994 at the USENIX Summer Technical Conference includes the system design together with performance measurement results from the prototype implementation to clearly demonstrate the practicality of a secure sockets layer.
dcterms:subject
dbc:Internet_security dbc:Transport_Layer_Security
dbo:wikiPageID
61327862
dbo:wikiPageRevisionID
1124080989
dbo:wikiPageWikiLink
dbr:ACM_Software_System_Award dbc:Internet_security dbr:Email dbr:Kerberos_(protocol) dbr:IETF dbr:Secure_Sockets_Layer dbr:The_University_of_Texas_at_Austin dbr:Netscape dbr:Symmetric_key_cryptography dbr:Simon_S._Lam dbr:HTTPS dbr:Application_layer dbc:Transport_Layer_Security dbr:Public_key_cryptography dbr:HTTP dbr:World-wide_web dbr:Transport_Layer_Security
owl:sameAs
wikidata:Q85800207 n10:Bz74i
dbp:wikiPageUsesTemplate
dbt:Reflist
dbo:abstract
Secure Network Programming (SNP) is a prototype of the first Secure Sockets Layer, designed and built by the Networking Research Laboratory at the University of Texas at Austin, led by Simon S. Lam. This work was published in the 1994 USENIX Summer Technical conference. For this project, the authors won the 2004 ACM Software System Award. This work began in 1991 as a theoretical investigation by the Networking Research Laboratory on the formal meaning of a protocol layer satisfying an upper interface specification as a service provider and a lower interface specification as a service consumer.A case study of adding a security layer between the application and network layers was presented. The Networking Research Laboratory received a grant from the National Security Agency in June 1991 to investigate how to apply their theory of modules and interfaces to security verification. At that time, there were three well-known authentication systems built (MIT's Kerberos) or being developed (DEC's SPX and IBM's KryptoKnight). All of these systems suffered from a common drawback, namely, they did not export a clean and easy-to-use interface that could be readily used by Internet applications. For example, it would take a tremendous amount of effort to “kerberize” an existing distributed application. Toward the goal of "secure network programming for the masses," the inventors of SNP conceived secure sockets as a high-level abstraction suitable for securing Internet applications. In 1993, they designed and built a prototype of SNP. Designed as an application sublayer on top of sockets, SNP provides a user interface closely resembling sockets. This resemblance was by design so that security could be retrofitted into existing socket programs with only minor modifications. Also, with such a sublayer carefully designed and its implementation thoroughly debugged, it can be easily used by any Internet application that uses sockets for end-to-end communications. This is a natural idea in hindsight but, in 1993, it was novel and a major departure from mainstream network security research at that time. SNP's secure sockets support both stream and datagram semantics with security guarantees (i.e., data origin authenticity, data destination authenticity, data integrity, and data confidentiality.) Many of the ideas and design choices in SNP can be found in subsequent secure sockets layers, including: placing authenticated communication endpoints in the application layer, use of public key cryptography for authentication, a handshake protocol for establishing session state including a shared secret, use of symmetric key cryptography for data confidentiality, and managing contexts and credentials in the secure sockets layer. The paper presented on June 8, 1994 at the USENIX Summer Technical Conference includes the system design together with performance measurement results from the prototype implementation to clearly demonstrate the practicality of a secure sockets layer. SNP invented secure sockets for Internet applications in general, independently and concurrently with the design and development of the HTTP protocol for the world-wide web which was still in its infancy in 1993. Subsequent secure socket layers (SSL by Netscape and TLS by IETF), re-implemented several years later using key ideas first presented in SNP, enabled secure e-commerce between browsers and servers. Today, many other Internet applications (including email) use HTTPS which consists of HTTP running over a secure sockets layer.
prov:wasDerivedFrom
wikipedia-en:Secure_Network_Programming?oldid=1124080989&ns=0
dbo:wikiPageLength
5649
foaf:isPrimaryTopicOf
wikipedia-en:Secure_Network_Programming
Subject Item
wikipedia-en:Secure_Network_Programming
foaf:primaryTopic
dbr:Secure_Network_Programming