Independent Policy Oriented Layering of Security Services View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2000

AUTHORS

Herbert Leitold , Peter Lipp , Andreas Sterbenz

ABSTRACT

Implementing a security policy has to cope with the diversity of communication requirements and applications. We present a policy oriented approach from the observation of common problems and characteristics given in networked applications. The solution reduces the trust required into the security system to a single entity. This is done in an application independent manner by fooling the applications and feigning a conventional, insecure networking environment that is further transformed to a secure communication infrastructure. More... »

PAGES

89-98

Book

TITLE

Information Security for Global Information Infrastructures

ISBN

978-1-4757-5479-7
978-0-387-35515-3

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-35515-3_10

DOI

http://dx.doi.org/10.1007/978-0-387-35515-3_10

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1012486601


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leitold", 
        "givenName": "Herbert", 
        "id": "sg:person.012516432633.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lipp", 
        "givenName": "Peter", 
        "id": "sg:person.013744464607.06", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013744464607.06"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Sterbenz", 
        "givenName": "Andreas", 
        "id": "sg:person.015337425607.72", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015337425607.72"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2000", 
    "datePublishedReg": "2000-01-01", 
    "description": "Implementing a security policy has to cope with the diversity of communication requirements and applications. We present a policy oriented approach from the observation of common problems and characteristics given in networked applications. The solution reduces the trust required into the security system to a single entity. This is done in an application independent manner by fooling the applications and feigning a conventional, insecure networking environment that is further transformed to a secure communication infrastructure.", 
    "editor": [
      {
        "familyName": "Qing", 
        "givenName": "Sihan", 
        "type": "Person"
      }, 
      {
        "familyName": "Eloff", 
        "givenName": "Jan H. P.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-35515-3_10", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-1-4757-5479-7", 
        "978-0-387-35515-3"
      ], 
      "name": "Information Security for Global Information Infrastructures", 
      "type": "Book"
    }, 
    "keywords": [
      "secure communication infrastructure", 
      "networked applications", 
      "security services", 
      "communication requirements", 
      "communication infrastructure", 
      "security system", 
      "security policies", 
      "applications", 
      "single entity", 
      "infrastructure", 
      "common problem", 
      "services", 
      "requirements", 
      "environment", 
      "trust", 
      "system", 
      "entities", 
      "independent manner", 
      "solution", 
      "policy", 
      "manner", 
      "layering", 
      "characteristics", 
      "diversity", 
      "observations", 
      "approach", 
      "problem", 
      "application independent manner", 
      "Independent Policy Oriented Layering", 
      "Policy Oriented Layering", 
      "Oriented Layering"
    ], 
    "name": "Independent Policy Oriented Layering of Security Services", 
    "pagination": "89-98", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1012486601"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-35515-3_10"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-35515-3_10", 
      "https://app.dimensions.ai/details/publication/pub.1012486601"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:14", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_244.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-35515-3_10"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35515-3_10'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35515-3_10'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35515-3_10'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35515-3_10'


 

This table displays all metadata directly associated to this object as RDF triples.

110 TRIPLES      23 PREDICATES      57 URIs      50 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-35515-3_10 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N0fa45c5429714c8e8aa564d1a67b0a6f
4 schema:datePublished 2000
5 schema:datePublishedReg 2000-01-01
6 schema:description Implementing a security policy has to cope with the diversity of communication requirements and applications. We present a policy oriented approach from the observation of common problems and characteristics given in networked applications. The solution reduces the trust required into the security system to a single entity. This is done in an application independent manner by fooling the applications and feigning a conventional, insecure networking environment that is further transformed to a secure communication infrastructure.
7 schema:editor Nb288b27109fa4467aae9b19174c7de25
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N12d7898febd847d28e30a948f93555c0
12 schema:keywords Independent Policy Oriented Layering
13 Oriented Layering
14 Policy Oriented Layering
15 application independent manner
16 applications
17 approach
18 characteristics
19 common problem
20 communication infrastructure
21 communication requirements
22 diversity
23 entities
24 environment
25 independent manner
26 infrastructure
27 layering
28 manner
29 networked applications
30 observations
31 policy
32 problem
33 requirements
34 secure communication infrastructure
35 security policies
36 security services
37 security system
38 services
39 single entity
40 solution
41 system
42 trust
43 schema:name Independent Policy Oriented Layering of Security Services
44 schema:pagination 89-98
45 schema:productId N1e852b0cf7094f9392f661f2875b8f00
46 Nd666c6dd24884d4f915618c2829b1831
47 schema:publisher N21a8b5cb164a46739306ead968851d5a
48 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012486601
49 https://doi.org/10.1007/978-0-387-35515-3_10
50 schema:sdDatePublished 2022-01-01T19:14
51 schema:sdLicense https://scigraph.springernature.com/explorer/license/
52 schema:sdPublisher N49caf6b204cc4d9da774564b2cd9e53d
53 schema:url https://doi.org/10.1007/978-0-387-35515-3_10
54 sgo:license sg:explorer/license/
55 sgo:sdDataset chapters
56 rdf:type schema:Chapter
57 N0fa45c5429714c8e8aa564d1a67b0a6f rdf:first sg:person.012516432633.90
58 rdf:rest N4a019d660b284a4da67ad8ff3109eae9
59 N12d7898febd847d28e30a948f93555c0 schema:isbn 978-0-387-35515-3
60 978-1-4757-5479-7
61 schema:name Information Security for Global Information Infrastructures
62 rdf:type schema:Book
63 N1e852b0cf7094f9392f661f2875b8f00 schema:name dimensions_id
64 schema:value pub.1012486601
65 rdf:type schema:PropertyValue
66 N21a8b5cb164a46739306ead968851d5a schema:name Springer Nature
67 rdf:type schema:Organisation
68 N47b6b3e99a854de59077f4f028947afb rdf:first Na2df00ada42444de8f8b19502ef9da0f
69 rdf:rest rdf:nil
70 N49caf6b204cc4d9da774564b2cd9e53d schema:name Springer Nature - SN SciGraph project
71 rdf:type schema:Organization
72 N4a019d660b284a4da67ad8ff3109eae9 rdf:first sg:person.013744464607.06
73 rdf:rest N4b6667edc9d440b78065f60e9c4f9c98
74 N4b6667edc9d440b78065f60e9c4f9c98 rdf:first sg:person.015337425607.72
75 rdf:rest rdf:nil
76 Na2df00ada42444de8f8b19502ef9da0f schema:familyName Eloff
77 schema:givenName Jan H. P.
78 rdf:type schema:Person
79 Na32022ef1ade448781b580a13ac1ab9f schema:familyName Qing
80 schema:givenName Sihan
81 rdf:type schema:Person
82 Nb288b27109fa4467aae9b19174c7de25 rdf:first Na32022ef1ade448781b580a13ac1ab9f
83 rdf:rest N47b6b3e99a854de59077f4f028947afb
84 Nd666c6dd24884d4f915618c2829b1831 schema:name doi
85 schema:value 10.1007/978-0-387-35515-3_10
86 rdf:type schema:PropertyValue
87 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
88 schema:name Information and Computing Sciences
89 rdf:type schema:DefinedTerm
90 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
91 schema:name Data Format
92 rdf:type schema:DefinedTerm
93 sg:person.012516432633.90 schema:affiliation grid-institutes:grid.410413.3
94 schema:familyName Leitold
95 schema:givenName Herbert
96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
97 rdf:type schema:Person
98 sg:person.013744464607.06 schema:affiliation grid-institutes:grid.410413.3
99 schema:familyName Lipp
100 schema:givenName Peter
101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013744464607.06
102 rdf:type schema:Person
103 sg:person.015337425607.72 schema:affiliation grid-institutes:grid.410413.3
104 schema:familyName Sterbenz
105 schema:givenName Andreas
106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015337425607.72
107 rdf:type schema:Person
108 grid-institutes:grid.410413.3 schema:alternateName IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria
109 schema:name IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria
110 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...