Ontology type: schema:Chapter
1996
AUTHORSReinhard Posch , Herbert Leitold , Franz Pucher
ABSTRACTExtending local area networks (LANs) to the home is an important area of today’s communication technology. Due to its global availability, making use of services offered by public telecommunication infrastructure gives a high connectivity and flexibility. There are different types of global infrastructure available to build such a remote access environment: Public switched telephone network (PSTN) using modems and wireless cellular radio systems like groupe spécial mobile (GSM) are used. However, integrated services digital network (ISDN) will replace modem lines due to its higher bandwidth and more adequate embedding. Such a heterogeneous remote access scheme needs enhanced access and traffic control. This paper demonstrates a router-based solution for enhanced ISDN call management. One of the main advantages is the separation of a strategic module which defines the behavior. However, using dial up lines to access LANs requires additional access control and user authentication. As the user profiles may vary widely, a remote access security policy is introduced, which has to deal with binding the user’s access rights to the user profile. This security system is based on an information filtering scheme, which is controlled by the authenticated security servers. The authentication algorithm is interchangeable and different authentication methods can be used simultaneously. These can range from simple password-based schemes for low privileged guest profiles to cryptographic methods like zero knowledge authentication using secure ID cards for high privileged remote access profiles. Previews of future, connection oriented remote access schemes like asynchronous transfer mode- (ATM) based broadband ISDN (B-ISDN) are given. More... »
PAGES222-233
Communications and Multimedia Security II
ISBN
978-1-5041-2931-2
978-0-387-35083-7
http://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20
DOIhttp://dx.doi.org/10.1007/978-0-387-35083-7_20
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1003121074
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information Systems",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria",
"id": "http://www.grid.ac/institutes/grid.410413.3",
"name": [
"Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria"
],
"type": "Organization"
},
"familyName": "Posch",
"givenName": "Reinhard",
"id": "sg:person.011236005071.18",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria",
"id": "http://www.grid.ac/institutes/grid.410413.3",
"name": [
"Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria"
],
"type": "Organization"
},
"familyName": "Leitold",
"givenName": "Herbert",
"id": "sg:person.012516432633.90",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria",
"id": "http://www.grid.ac/institutes/grid.410413.3",
"name": [
"Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria"
],
"type": "Organization"
},
"familyName": "Pucher",
"givenName": "Franz",
"id": "sg:person.014170706141.21",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014170706141.21"
],
"type": "Person"
}
],
"datePublished": "1996",
"datePublishedReg": "1996-01-01",
"description": "Extending local area networks (LANs) to the home is an important area of today\u2019s communication technology. Due to its global availability, making use of services offered by public telecommunication infrastructure gives a high connectivity and flexibility. There are different types of global infrastructure available to build such a remote access environment: Public switched telephone network (PSTN) using modems and wireless cellular radio systems like groupe sp\u00e9cial mobile (GSM) are used. However, integrated services digital network (ISDN) will replace modem lines due to its higher bandwidth and more adequate embedding. Such a heterogeneous remote access scheme needs enhanced access and traffic control. This paper demonstrates a router-based solution for enhanced ISDN call management. One of the main advantages is the separation of a strategic module which defines the behavior. However, using dial up lines to access LANs requires additional access control and user authentication. As the user profiles may vary widely, a remote access security policy is introduced, which has to deal with binding the user\u2019s access rights to the user profile. This security system is based on an information filtering scheme, which is controlled by the authenticated security servers. The authentication algorithm is interchangeable and different authentication methods can be used simultaneously. These can range from simple password-based schemes for low privileged guest profiles to cryptographic methods like zero knowledge authentication using secure ID cards for high privileged remote access profiles. Previews of future, connection oriented remote access schemes like asynchronous transfer mode- (ATM) based broadband ISDN (B-ISDN) are given.",
"editor": [
{
"familyName": "Horster",
"givenName": "Patrick",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-0-387-35083-7_20",
"inLanguage": "en",
"isAccessibleForFree": false,
"isPartOf": {
"isbn": [
"978-1-5041-2931-2",
"978-0-387-35083-7"
],
"name": "Communications and Multimedia Security II",
"type": "Book"
},
"keywords": [
"local area networks",
"Groupe Sp\u00e9cial Mobile",
"access scheme",
"user profiles",
"access rights",
"communication technologies",
"public telecommunication infrastructure",
"password-based schemes",
"remote access security",
"user profile management",
"user access rights",
"different authentication methods",
"services digital network",
"additional access control",
"remote access environment",
"today\u2019s communication technology",
"cellular radio systems",
"broadband ISDN",
"area networks",
"user authentication",
"high bandwidth",
"security server",
"cryptographic methods",
"authentication algorithm",
"access security",
"knowledge authentication",
"authentication method",
"access control",
"radio systems",
"telephone network",
"access profile",
"telecommunications infrastructure",
"access environment",
"profile management",
"modem lines",
"call management",
"security system",
"digital networks",
"ID card",
"global infrastructure",
"security policies",
"traffic control",
"authentication",
"strategic module",
"filtering scheme",
"network",
"infrastructure",
"scheme",
"main advantage",
"high connectivity",
"global availability",
"server",
"bandwidth",
"ISDN",
"modem",
"use of services",
"mobile",
"security",
"algorithm",
"embedding",
"important area",
"guest profiles",
"cards",
"system",
"services",
"module",
"dial",
"technology",
"connectivity",
"different types",
"flexibility",
"preview",
"access",
"environment",
"management",
"method",
"advantages",
"solution",
"separation",
"availability",
"connection",
"paper",
"lines",
"control",
"home",
"use",
"future",
"area",
"policy",
"profile",
"types",
"behavior",
"rights"
],
"name": "ISDN LAN Access: Remote access security and user profile management",
"pagination": "222-233",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1003121074"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-0-387-35083-7_20"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-0-387-35083-7_20",
"https://app.dimensions.ai/details/publication/pub.1003121074"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-10T10:56",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_97.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-0-387-35083-7_20"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'
This table displays all metadata directly associated to this object as RDF triples.
171 TRIPLES
23 PREDICATES
120 URIs
112 LITERALS
7 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:pub.10.1007/978-0-387-35083-7_20 | schema:about | anzsrc-for:08 |
2 | ″ | ″ | anzsrc-for:0804 |
3 | ″ | ″ | anzsrc-for:0806 |
4 | ″ | schema:author | N9ff9edb132a746be9f3ba56443775272 |
5 | ″ | schema:datePublished | 1996 |
6 | ″ | schema:datePublishedReg | 1996-01-01 |
7 | ″ | schema:description | Extending local area networks (LANs) to the home is an important area of today’s communication technology. Due to its global availability, making use of services offered by public telecommunication infrastructure gives a high connectivity and flexibility. There are different types of global infrastructure available to build such a remote access environment: Public switched telephone network (PSTN) using modems and wireless cellular radio systems like groupe spécial mobile (GSM) are used. However, integrated services digital network (ISDN) will replace modem lines due to its higher bandwidth and more adequate embedding. Such a heterogeneous remote access scheme needs enhanced access and traffic control. This paper demonstrates a router-based solution for enhanced ISDN call management. One of the main advantages is the separation of a strategic module which defines the behavior. However, using dial up lines to access LANs requires additional access control and user authentication. As the user profiles may vary widely, a remote access security policy is introduced, which has to deal with binding the user’s access rights to the user profile. This security system is based on an information filtering scheme, which is controlled by the authenticated security servers. The authentication algorithm is interchangeable and different authentication methods can be used simultaneously. These can range from simple password-based schemes for low privileged guest profiles to cryptographic methods like zero knowledge authentication using secure ID cards for high privileged remote access profiles. Previews of future, connection oriented remote access schemes like asynchronous transfer mode- (ATM) based broadband ISDN (B-ISDN) are given. |
8 | ″ | schema:editor | Nd377c4c1f4484eeda8b2cb475e669c62 |
9 | ″ | schema:genre | chapter |
10 | ″ | schema:inLanguage | en |
11 | ″ | schema:isAccessibleForFree | false |
12 | ″ | schema:isPartOf | N71cfeb34c99f46c9aa12ef71dbc5e958 |
13 | ″ | schema:keywords | Groupe Spécial Mobile |
14 | ″ | ″ | ID card |
15 | ″ | ″ | ISDN |
16 | ″ | ″ | access |
17 | ″ | ″ | access control |
18 | ″ | ″ | access environment |
19 | ″ | ″ | access profile |
20 | ″ | ″ | access rights |
21 | ″ | ″ | access scheme |
22 | ″ | ″ | access security |
23 | ″ | ″ | additional access control |
24 | ″ | ″ | advantages |
25 | ″ | ″ | algorithm |
26 | ″ | ″ | area |
27 | ″ | ″ | area networks |
28 | ″ | ″ | authentication |
29 | ″ | ″ | authentication algorithm |
30 | ″ | ″ | authentication method |
31 | ″ | ″ | availability |
32 | ″ | ″ | bandwidth |
33 | ″ | ″ | behavior |
34 | ″ | ″ | broadband ISDN |
35 | ″ | ″ | call management |
36 | ″ | ″ | cards |
37 | ″ | ″ | cellular radio systems |
38 | ″ | ″ | communication technologies |
39 | ″ | ″ | connection |
40 | ″ | ″ | connectivity |
41 | ″ | ″ | control |
42 | ″ | ″ | cryptographic methods |
43 | ″ | ″ | dial |
44 | ″ | ″ | different authentication methods |
45 | ″ | ″ | different types |
46 | ″ | ″ | digital networks |
47 | ″ | ″ | embedding |
48 | ″ | ″ | environment |
49 | ″ | ″ | filtering scheme |
50 | ″ | ″ | flexibility |
51 | ″ | ″ | future |
52 | ″ | ″ | global availability |
53 | ″ | ″ | global infrastructure |
54 | ″ | ″ | guest profiles |
55 | ″ | ″ | high bandwidth |
56 | ″ | ″ | high connectivity |
57 | ″ | ″ | home |
58 | ″ | ″ | important area |
59 | ″ | ″ | infrastructure |
60 | ″ | ″ | knowledge authentication |
61 | ″ | ″ | lines |
62 | ″ | ″ | local area networks |
63 | ″ | ″ | main advantage |
64 | ″ | ″ | management |
65 | ″ | ″ | method |
66 | ″ | ″ | mobile |
67 | ″ | ″ | modem |
68 | ″ | ″ | modem lines |
69 | ″ | ″ | module |
70 | ″ | ″ | network |
71 | ″ | ″ | paper |
72 | ″ | ″ | password-based schemes |
73 | ″ | ″ | policy |
74 | ″ | ″ | preview |
75 | ″ | ″ | profile |
76 | ″ | ″ | profile management |
77 | ″ | ″ | public telecommunication infrastructure |
78 | ″ | ″ | radio systems |
79 | ″ | ″ | remote access environment |
80 | ″ | ″ | remote access security |
81 | ″ | ″ | rights |
82 | ″ | ″ | scheme |
83 | ″ | ″ | security |
84 | ″ | ″ | security policies |
85 | ″ | ″ | security server |
86 | ″ | ″ | security system |
87 | ″ | ″ | separation |
88 | ″ | ″ | server |
89 | ″ | ″ | services |
90 | ″ | ″ | services digital network |
91 | ″ | ″ | solution |
92 | ″ | ″ | strategic module |
93 | ″ | ″ | system |
94 | ″ | ″ | technology |
95 | ″ | ″ | telecommunications infrastructure |
96 | ″ | ″ | telephone network |
97 | ″ | ″ | today’s communication technology |
98 | ″ | ″ | traffic control |
99 | ″ | ″ | types |
100 | ″ | ″ | use |
101 | ″ | ″ | use of services |
102 | ″ | ″ | user access rights |
103 | ″ | ″ | user authentication |
104 | ″ | ″ | user profile management |
105 | ″ | ″ | user profiles |
106 | ″ | schema:name | ISDN LAN Access: Remote access security and user profile management |
107 | ″ | schema:pagination | 222-233 |
108 | ″ | schema:productId | N055633c40f4c4c4c9c59418646c5c948 |
109 | ″ | ″ | N4f2c6a1b14db400b93216914e9e84c77 |
110 | ″ | schema:publisher | Nc21978cac8a64a6bbb712f1a17223724 |
111 | ″ | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1003121074 |
112 | ″ | ″ | https://doi.org/10.1007/978-0-387-35083-7_20 |
113 | ″ | schema:sdDatePublished | 2022-05-10T10:56 |
114 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
115 | ″ | schema:sdPublisher | N4318b06f55464b15871e32990af6d7b8 |
116 | ″ | schema:url | https://doi.org/10.1007/978-0-387-35083-7_20 |
117 | ″ | sgo:license | sg:explorer/license/ |
118 | ″ | sgo:sdDataset | chapters |
119 | ″ | rdf:type | schema:Chapter |
120 | N055633c40f4c4c4c9c59418646c5c948 | schema:name | dimensions_id |
121 | ″ | schema:value | pub.1003121074 |
122 | ″ | rdf:type | schema:PropertyValue |
123 | N339280563890411ea095d19936d989ea | schema:familyName | Horster |
124 | ″ | schema:givenName | Patrick |
125 | ″ | rdf:type | schema:Person |
126 | N4318b06f55464b15871e32990af6d7b8 | schema:name | Springer Nature - SN SciGraph project |
127 | ″ | rdf:type | schema:Organization |
128 | N4f2c6a1b14db400b93216914e9e84c77 | schema:name | doi |
129 | ″ | schema:value | 10.1007/978-0-387-35083-7_20 |
130 | ″ | rdf:type | schema:PropertyValue |
131 | N70f8ac630aae479699d3281311d1711d | rdf:first | sg:person.012516432633.90 |
132 | ″ | rdf:rest | N9d9398bb3f8242e989d526ceace8ab71 |
133 | N71cfeb34c99f46c9aa12ef71dbc5e958 | schema:isbn | 978-0-387-35083-7 |
134 | ″ | ″ | 978-1-5041-2931-2 |
135 | ″ | schema:name | Communications and Multimedia Security II |
136 | ″ | rdf:type | schema:Book |
137 | N9d9398bb3f8242e989d526ceace8ab71 | rdf:first | sg:person.014170706141.21 |
138 | ″ | rdf:rest | rdf:nil |
139 | N9ff9edb132a746be9f3ba56443775272 | rdf:first | sg:person.011236005071.18 |
140 | ″ | rdf:rest | N70f8ac630aae479699d3281311d1711d |
141 | Nc21978cac8a64a6bbb712f1a17223724 | schema:name | Springer Nature |
142 | ″ | rdf:type | schema:Organisation |
143 | Nd377c4c1f4484eeda8b2cb475e669c62 | rdf:first | N339280563890411ea095d19936d989ea |
144 | ″ | rdf:rest | rdf:nil |
145 | anzsrc-for:08 | schema:inDefinedTermSet | anzsrc-for: |
146 | ″ | schema:name | Information and Computing Sciences |
147 | ″ | rdf:type | schema:DefinedTerm |
148 | anzsrc-for:0804 | schema:inDefinedTermSet | anzsrc-for: |
149 | ″ | schema:name | Data Format |
150 | ″ | rdf:type | schema:DefinedTerm |
151 | anzsrc-for:0806 | schema:inDefinedTermSet | anzsrc-for: |
152 | ″ | schema:name | Information Systems |
153 | ″ | rdf:type | schema:DefinedTerm |
154 | sg:person.011236005071.18 | schema:affiliation | grid-institutes:grid.410413.3 |
155 | ″ | schema:familyName | Posch |
156 | ″ | schema:givenName | Reinhard |
157 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18 |
158 | ″ | rdf:type | schema:Person |
159 | sg:person.012516432633.90 | schema:affiliation | grid-institutes:grid.410413.3 |
160 | ″ | schema:familyName | Leitold |
161 | ″ | schema:givenName | Herbert |
162 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90 |
163 | ″ | rdf:type | schema:Person |
164 | sg:person.014170706141.21 | schema:affiliation | grid-institutes:grid.410413.3 |
165 | ″ | schema:familyName | Pucher |
166 | ″ | schema:givenName | Franz |
167 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014170706141.21 |
168 | ″ | rdf:type | schema:Person |
169 | grid-institutes:grid.410413.3 | schema:alternateName | Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria |
170 | ″ | schema:name | Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria |
171 | ″ | rdf:type | schema:Organization |