ISDN LAN Access: Remote access security and user profile management View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

1996

AUTHORS

Reinhard Posch , Herbert Leitold , Franz Pucher

ABSTRACT

Extending local area networks (LANs) to the home is an important area of today’s communication technology. Due to its global availability, making use of services offered by public telecommunication infrastructure gives a high connectivity and flexibility. There are different types of global infrastructure available to build such a remote access environment: Public switched telephone network (PSTN) using modems and wireless cellular radio systems like groupe spécial mobile (GSM) are used. However, integrated services digital network (ISDN) will replace modem lines due to its higher bandwidth and more adequate embedding. Such a heterogeneous remote access scheme needs enhanced access and traffic control. This paper demonstrates a router-based solution for enhanced ISDN call management. One of the main advantages is the separation of a strategic module which defines the behavior. However, using dial up lines to access LANs requires additional access control and user authentication. As the user profiles may vary widely, a remote access security policy is introduced, which has to deal with binding the user’s access rights to the user profile. This security system is based on an information filtering scheme, which is controlled by the authenticated security servers. The authentication algorithm is interchangeable and different authentication methods can be used simultaneously. These can range from simple password-based schemes for low privileged guest profiles to cryptographic methods like zero knowledge authentication using secure ID cards for high privileged remote access profiles. Previews of future, connection oriented remote access schemes like asynchronous transfer mode- (ATM) based broadband ISDN (B-ISDN) are given. More... »

PAGES

222-233

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20

DOI

http://dx.doi.org/10.1007/978-0-387-35083-7_20

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1003121074


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Posch", 
        "givenName": "Reinhard", 
        "id": "sg:person.011236005071.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leitold", 
        "givenName": "Herbert", 
        "id": "sg:person.012516432633.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Pucher", 
        "givenName": "Franz", 
        "id": "sg:person.014170706141.21", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014170706141.21"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1996", 
    "datePublishedReg": "1996-01-01", 
    "description": "Extending local area networks (LANs) to the home is an important area of today\u2019s communication technology. Due to its global availability, making use of services offered by public telecommunication infrastructure gives a high connectivity and flexibility. There are different types of global infrastructure available to build such a remote access environment: Public switched telephone network (PSTN) using modems and wireless cellular radio systems like groupe sp\u00e9cial mobile (GSM) are used. However, integrated services digital network (ISDN) will replace modem lines due to its higher bandwidth and more adequate embedding. Such a heterogeneous remote access scheme needs enhanced access and traffic control. This paper demonstrates a router-based solution for enhanced ISDN call management. One of the main advantages is the separation of a strategic module which defines the behavior. However, using dial up lines to access LANs requires additional access control and user authentication. As the user profiles may vary widely, a remote access security policy is introduced, which has to deal with binding the user\u2019s access rights to the user profile. This security system is based on an information filtering scheme, which is controlled by the authenticated security servers. The authentication algorithm is interchangeable and different authentication methods can be used simultaneously. These can range from simple password-based schemes for low privileged guest profiles to cryptographic methods like zero knowledge authentication using secure ID cards for high privileged remote access profiles. Previews of future, connection oriented remote access schemes like asynchronous transfer mode- (ATM) based broadband ISDN (B-ISDN) are given.", 
    "editor": [
      {
        "familyName": "Horster", 
        "givenName": "Patrick", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-35083-7_20", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-1-5041-2931-2", 
        "978-0-387-35083-7"
      ], 
      "name": "Communications and Multimedia Security II", 
      "type": "Book"
    }, 
    "keywords": [
      "local area networks", 
      "Groupe Sp\u00e9cial Mobile", 
      "access scheme", 
      "user profiles", 
      "access rights", 
      "communication technologies", 
      "public telecommunication infrastructure", 
      "password-based schemes", 
      "remote access security", 
      "user profile management", 
      "user access rights", 
      "different authentication methods", 
      "services digital network", 
      "additional access control", 
      "remote access environment", 
      "today\u2019s communication technology", 
      "cellular radio systems", 
      "broadband ISDN", 
      "area networks", 
      "user authentication", 
      "high bandwidth", 
      "security server", 
      "cryptographic methods", 
      "authentication algorithm", 
      "access security", 
      "knowledge authentication", 
      "authentication method", 
      "access control", 
      "radio systems", 
      "telephone network", 
      "access profile", 
      "telecommunications infrastructure", 
      "access environment", 
      "profile management", 
      "modem lines", 
      "call management", 
      "security system", 
      "digital networks", 
      "ID card", 
      "global infrastructure", 
      "security policies", 
      "traffic control", 
      "authentication", 
      "strategic module", 
      "filtering scheme", 
      "network", 
      "infrastructure", 
      "scheme", 
      "main advantage", 
      "high connectivity", 
      "global availability", 
      "server", 
      "bandwidth", 
      "ISDN", 
      "modem", 
      "use of services", 
      "mobile", 
      "security", 
      "algorithm", 
      "embedding", 
      "important area", 
      "guest profiles", 
      "cards", 
      "system", 
      "services", 
      "module", 
      "dial", 
      "technology", 
      "connectivity", 
      "different types", 
      "flexibility", 
      "preview", 
      "access", 
      "environment", 
      "management", 
      "method", 
      "advantages", 
      "solution", 
      "separation", 
      "availability", 
      "connection", 
      "paper", 
      "lines", 
      "control", 
      "home", 
      "use", 
      "future", 
      "area", 
      "policy", 
      "profile", 
      "types", 
      "behavior", 
      "rights"
    ], 
    "name": "ISDN LAN Access: Remote access security and user profile management", 
    "pagination": "222-233", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1003121074"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-35083-7_20"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-35083-7_20", 
      "https://app.dimensions.ai/details/publication/pub.1003121074"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-10T10:56", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_97.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-35083-7_20"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35083-7_20'


 

This table displays all metadata directly associated to this object as RDF triples.

171 TRIPLES      23 PREDICATES      120 URIs      112 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-35083-7_20 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 anzsrc-for:0806
4 schema:author N9ff9edb132a746be9f3ba56443775272
5 schema:datePublished 1996
6 schema:datePublishedReg 1996-01-01
7 schema:description Extending local area networks (LANs) to the home is an important area of today’s communication technology. Due to its global availability, making use of services offered by public telecommunication infrastructure gives a high connectivity and flexibility. There are different types of global infrastructure available to build such a remote access environment: Public switched telephone network (PSTN) using modems and wireless cellular radio systems like groupe spécial mobile (GSM) are used. However, integrated services digital network (ISDN) will replace modem lines due to its higher bandwidth and more adequate embedding. Such a heterogeneous remote access scheme needs enhanced access and traffic control. This paper demonstrates a router-based solution for enhanced ISDN call management. One of the main advantages is the separation of a strategic module which defines the behavior. However, using dial up lines to access LANs requires additional access control and user authentication. As the user profiles may vary widely, a remote access security policy is introduced, which has to deal with binding the user’s access rights to the user profile. This security system is based on an information filtering scheme, which is controlled by the authenticated security servers. The authentication algorithm is interchangeable and different authentication methods can be used simultaneously. These can range from simple password-based schemes for low privileged guest profiles to cryptographic methods like zero knowledge authentication using secure ID cards for high privileged remote access profiles. Previews of future, connection oriented remote access schemes like asynchronous transfer mode- (ATM) based broadband ISDN (B-ISDN) are given.
8 schema:editor Nd377c4c1f4484eeda8b2cb475e669c62
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree false
12 schema:isPartOf N71cfeb34c99f46c9aa12ef71dbc5e958
13 schema:keywords Groupe Spécial Mobile
14 ID card
15 ISDN
16 access
17 access control
18 access environment
19 access profile
20 access rights
21 access scheme
22 access security
23 additional access control
24 advantages
25 algorithm
26 area
27 area networks
28 authentication
29 authentication algorithm
30 authentication method
31 availability
32 bandwidth
33 behavior
34 broadband ISDN
35 call management
36 cards
37 cellular radio systems
38 communication technologies
39 connection
40 connectivity
41 control
42 cryptographic methods
43 dial
44 different authentication methods
45 different types
46 digital networks
47 embedding
48 environment
49 filtering scheme
50 flexibility
51 future
52 global availability
53 global infrastructure
54 guest profiles
55 high bandwidth
56 high connectivity
57 home
58 important area
59 infrastructure
60 knowledge authentication
61 lines
62 local area networks
63 main advantage
64 management
65 method
66 mobile
67 modem
68 modem lines
69 module
70 network
71 paper
72 password-based schemes
73 policy
74 preview
75 profile
76 profile management
77 public telecommunication infrastructure
78 radio systems
79 remote access environment
80 remote access security
81 rights
82 scheme
83 security
84 security policies
85 security server
86 security system
87 separation
88 server
89 services
90 services digital network
91 solution
92 strategic module
93 system
94 technology
95 telecommunications infrastructure
96 telephone network
97 today’s communication technology
98 traffic control
99 types
100 use
101 use of services
102 user access rights
103 user authentication
104 user profile management
105 user profiles
106 schema:name ISDN LAN Access: Remote access security and user profile management
107 schema:pagination 222-233
108 schema:productId N055633c40f4c4c4c9c59418646c5c948
109 N4f2c6a1b14db400b93216914e9e84c77
110 schema:publisher Nc21978cac8a64a6bbb712f1a17223724
111 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003121074
112 https://doi.org/10.1007/978-0-387-35083-7_20
113 schema:sdDatePublished 2022-05-10T10:56
114 schema:sdLicense https://scigraph.springernature.com/explorer/license/
115 schema:sdPublisher N4318b06f55464b15871e32990af6d7b8
116 schema:url https://doi.org/10.1007/978-0-387-35083-7_20
117 sgo:license sg:explorer/license/
118 sgo:sdDataset chapters
119 rdf:type schema:Chapter
120 N055633c40f4c4c4c9c59418646c5c948 schema:name dimensions_id
121 schema:value pub.1003121074
122 rdf:type schema:PropertyValue
123 N339280563890411ea095d19936d989ea schema:familyName Horster
124 schema:givenName Patrick
125 rdf:type schema:Person
126 N4318b06f55464b15871e32990af6d7b8 schema:name Springer Nature - SN SciGraph project
127 rdf:type schema:Organization
128 N4f2c6a1b14db400b93216914e9e84c77 schema:name doi
129 schema:value 10.1007/978-0-387-35083-7_20
130 rdf:type schema:PropertyValue
131 N70f8ac630aae479699d3281311d1711d rdf:first sg:person.012516432633.90
132 rdf:rest N9d9398bb3f8242e989d526ceace8ab71
133 N71cfeb34c99f46c9aa12ef71dbc5e958 schema:isbn 978-0-387-35083-7
134 978-1-5041-2931-2
135 schema:name Communications and Multimedia Security II
136 rdf:type schema:Book
137 N9d9398bb3f8242e989d526ceace8ab71 rdf:first sg:person.014170706141.21
138 rdf:rest rdf:nil
139 N9ff9edb132a746be9f3ba56443775272 rdf:first sg:person.011236005071.18
140 rdf:rest N70f8ac630aae479699d3281311d1711d
141 Nc21978cac8a64a6bbb712f1a17223724 schema:name Springer Nature
142 rdf:type schema:Organisation
143 Nd377c4c1f4484eeda8b2cb475e669c62 rdf:first N339280563890411ea095d19936d989ea
144 rdf:rest rdf:nil
145 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
146 schema:name Information and Computing Sciences
147 rdf:type schema:DefinedTerm
148 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
149 schema:name Data Format
150 rdf:type schema:DefinedTerm
151 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
152 schema:name Information Systems
153 rdf:type schema:DefinedTerm
154 sg:person.011236005071.18 schema:affiliation grid-institutes:grid.410413.3
155 schema:familyName Posch
156 schema:givenName Reinhard
157 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18
158 rdf:type schema:Person
159 sg:person.012516432633.90 schema:affiliation grid-institutes:grid.410413.3
160 schema:familyName Leitold
161 schema:givenName Herbert
162 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
163 rdf:type schema:Person
164 sg:person.014170706141.21 schema:affiliation grid-institutes:grid.410413.3
165 schema:familyName Pucher
166 schema:givenName Franz
167 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014170706141.21
168 rdf:type schema:Person
169 grid-institutes:grid.410413.3 schema:alternateName Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria
170 schema:name Institute for Applied Information Processing and Communications, University of Technology Graz, Klosterwiesgasse 32/I, A-8010, Graz, Austria
171 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...