B-ISDN user plane confidentiality by ATM cell stream intercepting encryption View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1997

AUTHORS

Herbert Leitold , Reinhard Posch

ABSTRACT

Broadband networking has evolved dramatically in the past few years. Especially the asynchronous transfer mode (ATM) has attracted attention in the area of high-speed communication, promising the integration of almost all communication profiles such as voice, video and computer-based multimedia communication. As ATM builds the transport technology of broadband integrated services digital network (B-ISDN), it is to be considered as the key technology of the data-highway initiatives aimed by the majority of industrial countries. However, the topic of network security plays an important role in any publicly accessible telecommunication infrastructure. Unfortunately, the progresses made in providing for adequate network security still lag behind the evolution of B-ISDN.In this paper we give an interim report on a project aiming to information privacy in B-ISDN infrastructures. Several approaches to B-ISDN security with emphasis on confidential user-to-user communication are discussed. We compare the different approaches to ATM encryption and propose the application of a method known as ATM cell stream interception. Therefore, we apply an encryption module to an ATM network interface card (NIC) using standardized interfaces and, thus, propose an architecture that is almost independent of the hardware. More... »

PAGES

155-166

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-35256-5_12

DOI

http://dx.doi.org/10.1007/978-0-387-35256-5_12

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1012279451


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leitold", 
        "givenName": "Herbert", 
        "id": "sg:person.012516432633.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Posch", 
        "givenName": "Reinhard", 
        "id": "sg:person.011236005071.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1997", 
    "datePublishedReg": "1997-01-01", 
    "description": "Broadband networking has evolved dramatically in the past few years. Especially the asynchronous transfer mode (ATM) has attracted attention in the area of high-speed communication, promising the integration of almost all communication profiles such as voice, video and computer-based multimedia communication. As ATM builds the transport technology of broadband integrated services digital network (B-ISDN), it is to be considered as the key technology of the data-highway initiatives aimed by the majority of industrial countries. However, the topic of network security plays an important role in any publicly accessible telecommunication infrastructure. Unfortunately, the progresses made in providing for adequate network security still lag behind the evolution of B-ISDN.In this paper we give an interim report on a project aiming to information privacy in B-ISDN infrastructures. Several approaches to B-ISDN security with emphasis on confidential user-to-user communication are discussed. We compare the different approaches to ATM encryption and propose the application of a method known as ATM cell stream interception. Therefore, we apply an encryption module to an ATM network interface card (NIC) using standardized interfaces and, thus, propose an architecture that is almost independent of the hardware.", 
    "editor": [
      {
        "familyName": "Katsikas", 
        "givenName": "Sokratis", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-35256-5_12", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-1-5041-2918-3", 
        "978-0-387-35256-5"
      ], 
      "name": "Communications and Multimedia Security", 
      "type": "Book"
    }, 
    "keywords": [
      "asynchronous transfer mode", 
      "network interface cards", 
      "network security", 
      "ATM network interface card", 
      "high-speed communication", 
      "accessible telecommunications infrastructure", 
      "services digital network", 
      "multimedia communications", 
      "broadband networking", 
      "encryption module", 
      "B-ISDN", 
      "standardized interfaces", 
      "interface card", 
      "information privacy", 
      "user communication", 
      "telecommunications infrastructure", 
      "digital networks", 
      "transport technologies", 
      "key technologies", 
      "ATM cell streams", 
      "transfer mode", 
      "encryption", 
      "security", 
      "communication profiles", 
      "communication", 
      "infrastructure", 
      "broadband", 
      "technology", 
      "privacy", 
      "different approaches", 
      "hardware", 
      "networking", 
      "video", 
      "users", 
      "confidentiality", 
      "architecture", 
      "network", 
      "cards", 
      "cell streams", 
      "module", 
      "applications", 
      "interface", 
      "integration", 
      "streams", 
      "project", 
      "topic", 
      "voice", 
      "progress", 
      "method", 
      "mode", 
      "approach", 
      "paper", 
      "interception", 
      "attention", 
      "initiatives", 
      "important role", 
      "area", 
      "evolution", 
      "emphasis", 
      "profile", 
      "years", 
      "role", 
      "interim report", 
      "majority", 
      "report", 
      "countries", 
      "industrial countries"
    ], 
    "name": "B-ISDN user plane confidentiality by ATM cell stream intercepting encryption", 
    "pagination": "155-166", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1012279451"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-35256-5_12"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-35256-5_12", 
      "https://app.dimensions.ai/details/publication/pub.1012279451"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-10T10:46", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_302.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-35256-5_12"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35256-5_12'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35256-5_12'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35256-5_12'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35256-5_12'


 

This table displays all metadata directly associated to this object as RDF triples.

134 TRIPLES      23 PREDICATES      93 URIs      86 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-35256-5_12 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N744a2c0efa3a48df9b51380ed8af9e8a
4 schema:datePublished 1997
5 schema:datePublishedReg 1997-01-01
6 schema:description Broadband networking has evolved dramatically in the past few years. Especially the asynchronous transfer mode (ATM) has attracted attention in the area of high-speed communication, promising the integration of almost all communication profiles such as voice, video and computer-based multimedia communication. As ATM builds the transport technology of broadband integrated services digital network (B-ISDN), it is to be considered as the key technology of the data-highway initiatives aimed by the majority of industrial countries. However, the topic of network security plays an important role in any publicly accessible telecommunication infrastructure. Unfortunately, the progresses made in providing for adequate network security still lag behind the evolution of B-ISDN.In this paper we give an interim report on a project aiming to information privacy in B-ISDN infrastructures. Several approaches to B-ISDN security with emphasis on confidential user-to-user communication are discussed. We compare the different approaches to ATM encryption and propose the application of a method known as ATM cell stream interception. Therefore, we apply an encryption module to an ATM network interface card (NIC) using standardized interfaces and, thus, propose an architecture that is almost independent of the hardware.
7 schema:editor Nc25ccb7624d3422fa0d6da7fcd00f7b4
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N1f8d32c71e4c4255a319236542104acd
12 schema:keywords ATM cell streams
13 ATM network interface card
14 B-ISDN
15 accessible telecommunications infrastructure
16 applications
17 approach
18 architecture
19 area
20 asynchronous transfer mode
21 attention
22 broadband
23 broadband networking
24 cards
25 cell streams
26 communication
27 communication profiles
28 confidentiality
29 countries
30 different approaches
31 digital networks
32 emphasis
33 encryption
34 encryption module
35 evolution
36 hardware
37 high-speed communication
38 important role
39 industrial countries
40 information privacy
41 infrastructure
42 initiatives
43 integration
44 interception
45 interface
46 interface card
47 interim report
48 key technologies
49 majority
50 method
51 mode
52 module
53 multimedia communications
54 network
55 network interface cards
56 network security
57 networking
58 paper
59 privacy
60 profile
61 progress
62 project
63 report
64 role
65 security
66 services digital network
67 standardized interfaces
68 streams
69 technology
70 telecommunications infrastructure
71 topic
72 transfer mode
73 transport technologies
74 user communication
75 users
76 video
77 voice
78 years
79 schema:name B-ISDN user plane confidentiality by ATM cell stream intercepting encryption
80 schema:pagination 155-166
81 schema:productId N6d807b25d33e40a0ac068afc7f8fa06c
82 N878212aa22564335b0598df7338b4079
83 schema:publisher N959b3fe5593d4851b4d9d6be232446ae
84 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012279451
85 https://doi.org/10.1007/978-0-387-35256-5_12
86 schema:sdDatePublished 2022-05-10T10:46
87 schema:sdLicense https://scigraph.springernature.com/explorer/license/
88 schema:sdPublisher N63b1db535f1b4bde94110b547fa0d2ee
89 schema:url https://doi.org/10.1007/978-0-387-35256-5_12
90 sgo:license sg:explorer/license/
91 sgo:sdDataset chapters
92 rdf:type schema:Chapter
93 N03172d830c1942be8a3cb5384b73aa16 rdf:first sg:person.011236005071.18
94 rdf:rest rdf:nil
95 N1f8d32c71e4c4255a319236542104acd schema:isbn 978-0-387-35256-5
96 978-1-5041-2918-3
97 schema:name Communications and Multimedia Security
98 rdf:type schema:Book
99 N63b1db535f1b4bde94110b547fa0d2ee schema:name Springer Nature - SN SciGraph project
100 rdf:type schema:Organization
101 N6d807b25d33e40a0ac068afc7f8fa06c schema:name doi
102 schema:value 10.1007/978-0-387-35256-5_12
103 rdf:type schema:PropertyValue
104 N744a2c0efa3a48df9b51380ed8af9e8a rdf:first sg:person.012516432633.90
105 rdf:rest N03172d830c1942be8a3cb5384b73aa16
106 N878212aa22564335b0598df7338b4079 schema:name dimensions_id
107 schema:value pub.1012279451
108 rdf:type schema:PropertyValue
109 N959b3fe5593d4851b4d9d6be232446ae schema:name Springer Nature
110 rdf:type schema:Organisation
111 N9e4a0c9f6a9f4ce2aca45c91a8850c60 schema:familyName Katsikas
112 schema:givenName Sokratis
113 rdf:type schema:Person
114 Nc25ccb7624d3422fa0d6da7fcd00f7b4 rdf:first N9e4a0c9f6a9f4ce2aca45c91a8850c60
115 rdf:rest rdf:nil
116 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
117 schema:name Information and Computing Sciences
118 rdf:type schema:DefinedTerm
119 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
120 schema:name Data Format
121 rdf:type schema:DefinedTerm
122 sg:person.011236005071.18 schema:affiliation grid-institutes:None
123 schema:familyName Posch
124 schema:givenName Reinhard
125 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18
126 rdf:type schema:Person
127 sg:person.012516432633.90 schema:affiliation grid-institutes:None
128 schema:familyName Leitold
129 schema:givenName Herbert
130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
131 rdf:type schema:Person
132 grid-institutes:None schema:alternateName Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria
133 schema:name Institute for Applied Information Processing and Communications University of Technology, Klosterwiesgasse 32/1, A-8010 Graz, Graz, Austria
134 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...