B-ISDN user plane confidentiality by ATM cell stream intercepting encryption View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

1997

AUTHORS

Herbert Leitold , Reinhard Posch

ABSTRACT

Broadband networking has evolved dramatically in the past few years. Especially the asynchronous transfer mode (ATM) has attracted attention in the area of high-speed communication, promising the integration of almost all communication profiles such as voice, video and computer-based multimedia communication. As ATM builds the transport technology of broadband integrated services digital network (B-ISDN), it is to be considered as the key technology of the data-highway initiatives aimed by the majority of industrial countries. However, the topic of network security plays an important role in any publicly accessible telecommunication infrastructure. Unfortunately, the progresses made in providing for adequate network security still lag behind the evolution of B-ISDN.In this paper we give an interim report on a project aiming to information privacy in B-ISDN infrastructures. Several approaches to B-ISDN security with emphasis on confidential user-to-user communication are discussed. We compare the different approaches to ATM encryption and propose the application of a method known as ATM cell stream interception. Therefore, we apply an encryption module to an ATM network interface card (NIC) using standardized interfaces and, thus, propose an architecture that is almost independent of the hardware. More... »

PAGES

155-166

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-35256-5_12

DOI

http://dx.doi.org/10.1007/978-0-387-35256-5_12

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1012279451


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leitold", 
        "givenName": "Herbert", 
        "id": "sg:person.012516432633.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Posch", 
        "givenName": "Reinhard", 
        "id": "sg:person.011236005071.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1997", 
    "datePublishedReg": "1997-01-01", 
    "description": "Broadband networking has evolved dramatically in the past few years. Especially the asynchronous transfer mode (ATM) has attracted attention in the area of high-speed communication, promising the integration of almost all communication profiles such as voice, video and computer-based multimedia communication. As ATM builds the transport technology of broadband integrated services digital network (B-ISDN), it is to be considered as the key technology of the data-highway initiatives aimed by the majority of industrial countries. However, the topic of network security plays an important role in any publicly accessible telecommunication infrastructure. Unfortunately, the progresses made in providing for adequate network security still lag behind the evolution of B-ISDN.In this paper we give an interim report on a project aiming to information privacy in B-ISDN infrastructures. Several approaches to B-ISDN security with emphasis on confidential user-to-user communication are discussed. We compare the different approaches to ATM encryption and propose the application of a method known as ATM cell stream interception. Therefore, we apply an encryption module to an ATM network interface card (NIC) using standardized interfaces and, thus, propose an architecture that is almost independent of the hardware.", 
    "editor": [
      {
        "familyName": "Katsikas", 
        "givenName": "Sokratis", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-35256-5_12", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-1-5041-2918-3", 
        "978-0-387-35256-5"
      ], 
      "name": "Communications and Multimedia Security", 
      "type": "Book"
    }, 
    "keywords": [
      "asynchronous transfer mode", 
      "network interface cards", 
      "network security", 
      "ATM network interface card", 
      "high-speed communication", 
      "accessible telecommunications infrastructure", 
      "services digital network", 
      "ATM cell streams", 
      "ISDN infrastructure", 
      "broadband networking", 
      "multimedia communications", 
      "interface card", 
      "transport technologies", 
      "digital networks", 
      "user communication", 
      "telecommunications infrastructure", 
      "transfer mode", 
      "encryption module", 
      "standardized interfaces", 
      "key technologies", 
      "information privacy", 
      "communication", 
      "communication profiles", 
      "encryption", 
      "security", 
      "cell streams", 
      "infrastructure", 
      "broadband", 
      "technology", 
      "ISDN", 
      "networking", 
      "privacy", 
      "network", 
      "hardware", 
      "different approaches", 
      "video", 
      "users", 
      "confidentiality", 
      "architecture", 
      "cards", 
      "voice", 
      "module", 
      "applications", 
      "integration", 
      "interface", 
      "streams", 
      "paper", 
      "project", 
      "interception", 
      "topic", 
      "approach", 
      "method", 
      "mode", 
      "progress", 
      "initiatives", 
      "attention", 
      "important role", 
      "area", 
      "emphasis", 
      "evolution", 
      "years", 
      "profile", 
      "interim report", 
      "role", 
      "industrial countries", 
      "majority", 
      "report", 
      "countries", 
      "computer-based multimedia communication", 
      "data-highway initiatives", 
      "adequate network security", 
      "ISDN security", 
      "confidential user", 
      "ATM encryption", 
      "ATM cell stream interception", 
      "cell stream interception", 
      "stream interception", 
      "ISDN user plane confidentiality", 
      "user plane confidentiality", 
      "plane confidentiality"
    ], 
    "name": "B-ISDN user plane confidentiality by ATM cell stream intercepting encryption", 
    "pagination": "155-166", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1012279451"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-35256-5_12"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-35256-5_12", 
      "https://app.dimensions.ai/details/publication/pub.1012279451"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:12", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_208.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-35256-5_12"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35256-5_12'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35256-5_12'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35256-5_12'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35256-5_12'


 

This table displays all metadata directly associated to this object as RDF triples.

147 TRIPLES      23 PREDICATES      106 URIs      99 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-35256-5_12 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N3473a65ea6c54147b5d7620645bb427a
4 schema:datePublished 1997
5 schema:datePublishedReg 1997-01-01
6 schema:description Broadband networking has evolved dramatically in the past few years. Especially the asynchronous transfer mode (ATM) has attracted attention in the area of high-speed communication, promising the integration of almost all communication profiles such as voice, video and computer-based multimedia communication. As ATM builds the transport technology of broadband integrated services digital network (B-ISDN), it is to be considered as the key technology of the data-highway initiatives aimed by the majority of industrial countries. However, the topic of network security plays an important role in any publicly accessible telecommunication infrastructure. Unfortunately, the progresses made in providing for adequate network security still lag behind the evolution of B-ISDN.In this paper we give an interim report on a project aiming to information privacy in B-ISDN infrastructures. Several approaches to B-ISDN security with emphasis on confidential user-to-user communication are discussed. We compare the different approaches to ATM encryption and propose the application of a method known as ATM cell stream interception. Therefore, we apply an encryption module to an ATM network interface card (NIC) using standardized interfaces and, thus, propose an architecture that is almost independent of the hardware.
7 schema:editor Ne595e47832f74a12aad2e36b97fdcee7
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N7bc30f8630bb493ba0493322b6aaf1dd
12 schema:keywords ATM cell stream interception
13 ATM cell streams
14 ATM encryption
15 ATM network interface card
16 ISDN
17 ISDN infrastructure
18 ISDN security
19 ISDN user plane confidentiality
20 accessible telecommunications infrastructure
21 adequate network security
22 applications
23 approach
24 architecture
25 area
26 asynchronous transfer mode
27 attention
28 broadband
29 broadband networking
30 cards
31 cell stream interception
32 cell streams
33 communication
34 communication profiles
35 computer-based multimedia communication
36 confidential user
37 confidentiality
38 countries
39 data-highway initiatives
40 different approaches
41 digital networks
42 emphasis
43 encryption
44 encryption module
45 evolution
46 hardware
47 high-speed communication
48 important role
49 industrial countries
50 information privacy
51 infrastructure
52 initiatives
53 integration
54 interception
55 interface
56 interface card
57 interim report
58 key technologies
59 majority
60 method
61 mode
62 module
63 multimedia communications
64 network
65 network interface cards
66 network security
67 networking
68 paper
69 plane confidentiality
70 privacy
71 profile
72 progress
73 project
74 report
75 role
76 security
77 services digital network
78 standardized interfaces
79 stream interception
80 streams
81 technology
82 telecommunications infrastructure
83 topic
84 transfer mode
85 transport technologies
86 user communication
87 user plane confidentiality
88 users
89 video
90 voice
91 years
92 schema:name B-ISDN user plane confidentiality by ATM cell stream intercepting encryption
93 schema:pagination 155-166
94 schema:productId N0eaad470e4cb44fcbf3897abe8cd23f1
95 N7889fd6a39c74d9c9ede1a3802bfdadb
96 schema:publisher N26805d8da3704f85888bb05c71a215d2
97 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012279451
98 https://doi.org/10.1007/978-0-387-35256-5_12
99 schema:sdDatePublished 2022-01-01T19:12
100 schema:sdLicense https://scigraph.springernature.com/explorer/license/
101 schema:sdPublisher Ne7d09a1d946a4abaa4438ff0da195cc1
102 schema:url https://doi.org/10.1007/978-0-387-35256-5_12
103 sgo:license sg:explorer/license/
104 sgo:sdDataset chapters
105 rdf:type schema:Chapter
106 N0eaad470e4cb44fcbf3897abe8cd23f1 schema:name doi
107 schema:value 10.1007/978-0-387-35256-5_12
108 rdf:type schema:PropertyValue
109 N26805d8da3704f85888bb05c71a215d2 schema:name Springer Nature
110 rdf:type schema:Organisation
111 N3473a65ea6c54147b5d7620645bb427a rdf:first sg:person.012516432633.90
112 rdf:rest Na5dcebb651b54622b24789bf2574b6f4
113 N7889fd6a39c74d9c9ede1a3802bfdadb schema:name dimensions_id
114 schema:value pub.1012279451
115 rdf:type schema:PropertyValue
116 N7bc30f8630bb493ba0493322b6aaf1dd schema:isbn 978-0-387-35256-5
117 978-1-5041-2918-3
118 schema:name Communications and Multimedia Security
119 rdf:type schema:Book
120 Na5dcebb651b54622b24789bf2574b6f4 rdf:first sg:person.011236005071.18
121 rdf:rest rdf:nil
122 Ne1d4a870dd3244b9a41fb60d6d12d5b0 schema:familyName Katsikas
123 schema:givenName Sokratis
124 rdf:type schema:Person
125 Ne595e47832f74a12aad2e36b97fdcee7 rdf:first Ne1d4a870dd3244b9a41fb60d6d12d5b0
126 rdf:rest rdf:nil
127 Ne7d09a1d946a4abaa4438ff0da195cc1 schema:name Springer Nature - SN SciGraph project
128 rdf:type schema:Organization
129 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
130 schema:name Information and Computing Sciences
131 rdf:type schema:DefinedTerm
132 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
133 schema:name Data Format
134 rdf:type schema:DefinedTerm
135 sg:person.011236005071.18 schema:affiliation grid-institutes:None
136 schema:familyName Posch
137 schema:givenName Reinhard
138 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18
139 rdf:type schema:Person
140 sg:person.012516432633.90 schema:affiliation grid-institutes:None
141 schema:familyName Leitold
142 schema:givenName Herbert
143 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
144 rdf:type schema:Person
145 grid-institutes:None schema:alternateName Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria
146 schema:name Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria
147 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...