ISDN LAN Access: Remote access security and user profile management View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

1996

AUTHORS

Reinhard Posch , Herbert Leitold , Franz Pucher

ABSTRACT

Extending local area networks (LANs) to the home is an important area of today’s communication technology. Due to its global availability, making use of services offered by public telecommunication infrastructure gives a high connectivity and flexibility. There are different types of global infrastructure available to build such a remote access environment: Public switched telephone network (PSTN) using modems and wireless cellular radio systems like groupe spécial mobile (GSM) are used. However, integrated services digital network (ISDN) will replace modem lines due to its higher bandwidth and more adequate embedding. Such a heterogeneous remote access scheme needs enhanced access and traffic control. This paper demonstrates a router-based solution for enhanced ISDN call management. One of the main advantages is the separation of a strategic module which defines the behavior. However, using dial up lines to access LANs requires additional access control and user authentication. As the user profiles may vary widely, a remote access security policy is introduced, which has to deal with binding the user’s access rights to the user profile. This security system is based on an information filtering scheme, which is controlled by the authenticated security servers. The authentication algorithm is interchangeable and different authentication methods can be used simultaneously. These can range from simple password-based schemes for low privileged guest profiles to cryptographic methods like zero knowledge authentication using secure ID cards for high privileged remote access profiles. Previews of future, connection oriented remote access schemes like asynchronous transfer mode- (ATM) based broadband ISDN (B-ISDN) are given. More... »

PAGES

222-233

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20

DOI

http://dx.doi.org/10.1007/978-0-387-35083-7_20

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1003121074


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Posch", 
        "givenName": "Reinhard", 
        "id": "sg:person.011236005071.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leitold", 
        "givenName": "Herbert", 
        "id": "sg:person.012516432633.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Pucher", 
        "givenName": "Franz", 
        "id": "sg:person.014170706141.21", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014170706141.21"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1996", 
    "datePublishedReg": "1996-01-01", 
    "description": "Extending local area networks (LANs) to the home is an important area of today\u2019s communication technology. Due to its global availability, making use of services offered by public telecommunication infrastructure gives a high connectivity and flexibility. There are different types of global infrastructure available to build such a remote access environment: Public switched telephone network (PSTN) using modems and wireless cellular radio systems like groupe sp\u00e9cial mobile (GSM) are used. However, integrated services digital network (ISDN) will replace modem lines due to its higher bandwidth and more adequate embedding. Such a heterogeneous remote access scheme needs enhanced access and traffic control. This paper demonstrates a router-based solution for enhanced ISDN call management. One of the main advantages is the separation of a strategic module which defines the behavior. However, using dial up lines to access LANs requires additional access control and user authentication. As the user profiles may vary widely, a remote access security policy is introduced, which has to deal with binding the user\u2019s access rights to the user profile. This security system is based on an information filtering scheme, which is controlled by the authenticated security servers. The authentication algorithm is interchangeable and different authentication methods can be used simultaneously. These can range from simple password-based schemes for low privileged guest profiles to cryptographic methods like zero knowledge authentication using secure ID cards for high privileged remote access profiles. Previews of future, connection oriented remote access schemes like asynchronous transfer mode- (ATM) based broadband ISDN (B-ISDN) are given.", 
    "editor": [
      {
        "familyName": "Horster", 
        "givenName": "Patrick", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-35083-7_20", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-1-5041-2931-2", 
        "978-0-387-35083-7"
      ], 
      "name": "Communications and Multimedia Security II", 
      "type": "Book"
    }, 
    "keywords": [
      "local area networks", 
      "Groupe Sp\u00e9cial Mobile", 
      "user profiles", 
      "access rights", 
      "password-based schemes", 
      "communication technologies", 
      "router-based solution", 
      "access scheme", 
      "remote access security", 
      "user profile management", 
      "user access rights", 
      "public telecommunication infrastructure", 
      "different authentication methods", 
      "additional access control", 
      "remote access environment", 
      "services digital network", 
      "user authentication", 
      "security server", 
      "authentication algorithm", 
      "cryptographic methods", 
      "access security", 
      "access control", 
      "authentication method", 
      "today's communication technology", 
      "profile management", 
      "access profile", 
      "modem lines", 
      "knowledge authentication", 
      "cellular radio systems", 
      "call management", 
      "access environment", 
      "digital networks", 
      "security system", 
      "security policies", 
      "area networks", 
      "global infrastructure", 
      "ID card", 
      "broadband ISDN", 
      "traffic control", 
      "telephone network", 
      "high bandwidth", 
      "telecommunications infrastructure", 
      "radio systems", 
      "filtering scheme", 
      "strategic module", 
      "authentication", 
      "network", 
      "infrastructure", 
      "scheme", 
      "main advantage", 
      "high connectivity", 
      "global availability", 
      "server", 
      "guest profiles", 
      "mobile", 
      "ISDN", 
      "algorithm", 
      "security", 
      "modem", 
      "important area", 
      "embedding", 
      "cards", 
      "use of services", 
      "system", 
      "bandwidth", 
      "module", 
      "dial", 
      "services", 
      "technology", 
      "connectivity", 
      "flexibility", 
      "different types", 
      "environment", 
      "preview", 
      "access", 
      "method", 
      "management", 
      "advantages", 
      "solution", 
      "availability", 
      "connection", 
      "control", 
      "paper", 
      "use", 
      "lines", 
      "future", 
      "home", 
      "policy", 
      "area", 
      "types", 
      "behavior", 
      "separation", 
      "profile", 
      "rights", 
      "wireless cellular radio systems", 
      "sp\u00e9cial mobile", 
      "adequate embedding", 
      "heterogeneous remote access scheme", 
      "remote access scheme", 
      "enhanced ISDN call management", 
      "ISDN call management", 
      "remote access security policy", 
      "access security policy", 
      "information filtering scheme", 
      "simple password-based schemes", 
      "low privileged guest profiles", 
      "privileged guest profiles", 
      "secure ID cards", 
      "high privileged remote access profiles", 
      "privileged remote access profiles", 
      "remote access profiles", 
      "Previews of future", 
      "asynchronous transfer mode- (ATM) based broadband ISDN", 
      "transfer mode- (ATM) based broadband ISDN", 
      "mode- (ATM) based broadband ISDN"
    ], 
    "name": "ISDN LAN Access: Remote access security and user profile management", 
    "pagination": "222-233", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1003121074"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-35083-7_20"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-35083-7_20", 
      "https://app.dimensions.ai/details/publication/pub.1003121074"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:08", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_14.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-35083-7_20"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'


 

This table displays all metadata directly associated to this object as RDF triples.

193 TRIPLES      23 PREDICATES      142 URIs      134 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-35083-7_20 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 anzsrc-for:0806
4 schema:author Nf2ab4df2e478485cb973db3487d5b18c
5 schema:datePublished 1996
6 schema:datePublishedReg 1996-01-01
7 schema:description Extending local area networks (LANs) to the home is an important area of today’s communication technology. Due to its global availability, making use of services offered by public telecommunication infrastructure gives a high connectivity and flexibility. There are different types of global infrastructure available to build such a remote access environment: Public switched telephone network (PSTN) using modems and wireless cellular radio systems like groupe spécial mobile (GSM) are used. However, integrated services digital network (ISDN) will replace modem lines due to its higher bandwidth and more adequate embedding. Such a heterogeneous remote access scheme needs enhanced access and traffic control. This paper demonstrates a router-based solution for enhanced ISDN call management. One of the main advantages is the separation of a strategic module which defines the behavior. However, using dial up lines to access LANs requires additional access control and user authentication. As the user profiles may vary widely, a remote access security policy is introduced, which has to deal with binding the user’s access rights to the user profile. This security system is based on an information filtering scheme, which is controlled by the authenticated security servers. The authentication algorithm is interchangeable and different authentication methods can be used simultaneously. These can range from simple password-based schemes for low privileged guest profiles to cryptographic methods like zero knowledge authentication using secure ID cards for high privileged remote access profiles. Previews of future, connection oriented remote access schemes like asynchronous transfer mode- (ATM) based broadband ISDN (B-ISDN) are given.
8 schema:editor Nb964a5c598434253990242c9ff08a20f
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree false
12 schema:isPartOf N2e4f10adf79a46f09798c9c97697497e
13 schema:keywords Groupe Spécial Mobile
14 ID card
15 ISDN
16 ISDN call management
17 Previews of future
18 access
19 access control
20 access environment
21 access profile
22 access rights
23 access scheme
24 access security
25 access security policy
26 additional access control
27 adequate embedding
28 advantages
29 algorithm
30 area
31 area networks
32 asynchronous transfer mode- (ATM) based broadband ISDN
33 authentication
34 authentication algorithm
35 authentication method
36 availability
37 bandwidth
38 behavior
39 broadband ISDN
40 call management
41 cards
42 cellular radio systems
43 communication technologies
44 connection
45 connectivity
46 control
47 cryptographic methods
48 dial
49 different authentication methods
50 different types
51 digital networks
52 embedding
53 enhanced ISDN call management
54 environment
55 filtering scheme
56 flexibility
57 future
58 global availability
59 global infrastructure
60 guest profiles
61 heterogeneous remote access scheme
62 high bandwidth
63 high connectivity
64 high privileged remote access profiles
65 home
66 important area
67 information filtering scheme
68 infrastructure
69 knowledge authentication
70 lines
71 local area networks
72 low privileged guest profiles
73 main advantage
74 management
75 method
76 mobile
77 mode- (ATM) based broadband ISDN
78 modem
79 modem lines
80 module
81 network
82 paper
83 password-based schemes
84 policy
85 preview
86 privileged guest profiles
87 privileged remote access profiles
88 profile
89 profile management
90 public telecommunication infrastructure
91 radio systems
92 remote access environment
93 remote access profiles
94 remote access scheme
95 remote access security
96 remote access security policy
97 rights
98 router-based solution
99 scheme
100 secure ID cards
101 security
102 security policies
103 security server
104 security system
105 separation
106 server
107 services
108 services digital network
109 simple password-based schemes
110 solution
111 spécial mobile
112 strategic module
113 system
114 technology
115 telecommunications infrastructure
116 telephone network
117 today's communication technology
118 traffic control
119 transfer mode- (ATM) based broadband ISDN
120 types
121 use
122 use of services
123 user access rights
124 user authentication
125 user profile management
126 user profiles
127 wireless cellular radio systems
128 schema:name ISDN LAN Access: Remote access security and user profile management
129 schema:pagination 222-233
130 schema:productId N4f00127a5aa5482189ea11d0739129d0
131 N56f723099d0840a3b2bb69234efc26fe
132 schema:publisher Nd2dbe506a6c7437a8c0ae7e46346032a
133 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003121074
134 https://doi.org/10.1007/978-0-387-35083-7_20
135 schema:sdDatePublished 2022-01-01T19:08
136 schema:sdLicense https://scigraph.springernature.com/explorer/license/
137 schema:sdPublisher N64cd62f5b5c44793ae8826c68858b533
138 schema:url https://doi.org/10.1007/978-0-387-35083-7_20
139 sgo:license sg:explorer/license/
140 sgo:sdDataset chapters
141 rdf:type schema:Chapter
142 N2e4f10adf79a46f09798c9c97697497e schema:isbn 978-0-387-35083-7
143 978-1-5041-2931-2
144 schema:name Communications and Multimedia Security II
145 rdf:type schema:Book
146 N329d01f4d9c841658b76faa4d3a0f19c rdf:first sg:person.012516432633.90
147 rdf:rest Nf2a08188040b42b8a6db78496ee34fb1
148 N493a3041a7f240ca8bc055f41b4b5f40 schema:familyName Horster
149 schema:givenName Patrick
150 rdf:type schema:Person
151 N4f00127a5aa5482189ea11d0739129d0 schema:name dimensions_id
152 schema:value pub.1003121074
153 rdf:type schema:PropertyValue
154 N56f723099d0840a3b2bb69234efc26fe schema:name doi
155 schema:value 10.1007/978-0-387-35083-7_20
156 rdf:type schema:PropertyValue
157 N64cd62f5b5c44793ae8826c68858b533 schema:name Springer Nature - SN SciGraph project
158 rdf:type schema:Organization
159 Nb964a5c598434253990242c9ff08a20f rdf:first N493a3041a7f240ca8bc055f41b4b5f40
160 rdf:rest rdf:nil
161 Nd2dbe506a6c7437a8c0ae7e46346032a schema:name Springer Nature
162 rdf:type schema:Organisation
163 Nf2a08188040b42b8a6db78496ee34fb1 rdf:first sg:person.014170706141.21
164 rdf:rest rdf:nil
165 Nf2ab4df2e478485cb973db3487d5b18c rdf:first sg:person.011236005071.18
166 rdf:rest N329d01f4d9c841658b76faa4d3a0f19c
167 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
168 schema:name Information and Computing Sciences
169 rdf:type schema:DefinedTerm
170 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
171 schema:name Data Format
172 rdf:type schema:DefinedTerm
173 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
174 schema:name Information Systems
175 rdf:type schema:DefinedTerm
176 sg:person.011236005071.18 schema:affiliation grid-institutes:grid.410413.3
177 schema:familyName Posch
178 schema:givenName Reinhard
179 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18
180 rdf:type schema:Person
181 sg:person.012516432633.90 schema:affiliation grid-institutes:grid.410413.3
182 schema:familyName Leitold
183 schema:givenName Herbert
184 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
185 rdf:type schema:Person
186 sg:person.014170706141.21 schema:affiliation grid-institutes:grid.410413.3
187 schema:familyName Pucher
188 schema:givenName Franz
189 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014170706141.21
190 rdf:type schema:Person
191 grid-institutes:grid.410413.3 schema:alternateName Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria
192 schema:name Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria
193 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...