ISDN Security Services View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1999

AUTHORS

Herbert Leitold , Karl Christian Posch , Reinhard Posch

ABSTRACT

Analog and digital plain old telephony service (POTS) is increasingly replaced by technologies that integrate voice, data, and video communication services. The integrated services digital network (ISDN) offers the embedding of this advanced multimedia communication into the subscriber loop. Nowadays widely available, ISDN builds a promising approach to improve company’s, public authority’s, or individual’s telecommunication facilities. However, a secure means of transferring sensitive information in any publicly accessible communication infrastructure is a major concern. In particular, authenticated and confidential communication is of paramount importance. In this paper, we describe the implementation of a paradigm where advanced security services are offered by the ISDN infrastructure as an additional service. The encryption model is based on transparently integrating the security devices into the ISDN network termination (NT). This makes the approach independent from both the terminal equipment (TE), and the service used, as well as independent from the ISDN switches and exchanges installed by the service provider. The paper discusses integration of the security device into the ISDN architecture, as well as the design of a data encryption standard (DES) TripleDES encryption unit being the buttress of the ISDN security solution. Comparisons to related work and products in the field are made and the relation of the project to the broadband pendant to ISDN—broadband-ISDN (B-ISDN)—is sketched. More... »

PAGES

21-35

Book

TITLE

Secure Information Networks

ISBN

978-1-4757-6487-1
978-0-387-35568-9

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-35568-9_2

DOI

http://dx.doi.org/10.1007/978-0-387-35568-9_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1046358402


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Graz University of Technology", 
          "id": "https://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010\u00a0Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leitold", 
        "givenName": "Herbert", 
        "id": "sg:person.012516432633.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Graz University of Technology", 
          "id": "https://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010\u00a0Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Posch", 
        "givenName": "Karl Christian", 
        "id": "sg:person.013270133353.59", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013270133353.59"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Graz University of Technology", 
          "id": "https://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010\u00a0Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Posch", 
        "givenName": "Reinhard", 
        "id": "sg:person.011236005071.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1999", 
    "datePublishedReg": "1999-01-01", 
    "description": "Analog and digital plain old telephony service (POTS) is increasingly replaced by technologies that integrate voice, data, and video communication services. The integrated services digital network (ISDN) offers the embedding of this advanced multimedia communication into the subscriber loop. Nowadays widely available, ISDN builds a promising approach to improve company\u2019s, public authority\u2019s, or individual\u2019s telecommunication facilities. However, a secure means of transferring sensitive information in any publicly accessible communication infrastructure is a major concern. In particular, authenticated and confidential communication is of paramount importance. In this paper, we describe the implementation of a paradigm where advanced security services are offered by the ISDN infrastructure as an additional service. The encryption model is based on transparently integrating the security devices into the ISDN network termination (NT). This makes the approach independent from both the terminal equipment (TE), and the service used, as well as independent from the ISDN switches and exchanges installed by the service provider. The paper discusses integration of the security device into the ISDN architecture, as well as the design of a data encryption standard (DES) TripleDES encryption unit being the buttress of the ISDN security solution. Comparisons to related work and products in the field are made and the relation of the project to the broadband pendant to ISDN\u2014broadband-ISDN (B-ISDN)\u2014is sketched.", 
    "editor": [
      {
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-35568-9_2", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-1-4757-6487-1", 
        "978-0-387-35568-9"
      ], 
      "name": "Secure Information Networks", 
      "type": "Book"
    }, 
    "name": "ISDN Security Services", 
    "pagination": "21-35", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-35568-9_2"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "dcd489943b27e724a3548248754ba64fbab08c626fdd50f86e394f53ddaaf8af"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1046358402"
        ]
      }
    ], 
    "publisher": {
      "location": "Boston, MA", 
      "name": "Springer US", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-35568-9_2", 
      "https://app.dimensions.ai/details/publication/pub.1046358402"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T21:47", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8693_00000079.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-0-387-35568-9_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35568-9_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35568-9_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35568-9_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35568-9_2'


 

This table displays all metadata directly associated to this object as RDF triples.

79 TRIPLES      22 PREDICATES      27 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-35568-9_2 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N4590d12e1fc4400ea070fa59b3de2381
4 schema:datePublished 1999
5 schema:datePublishedReg 1999-01-01
6 schema:description Analog and digital plain old telephony service (POTS) is increasingly replaced by technologies that integrate voice, data, and video communication services. The integrated services digital network (ISDN) offers the embedding of this advanced multimedia communication into the subscriber loop. Nowadays widely available, ISDN builds a promising approach to improve company’s, public authority’s, or individual’s telecommunication facilities. However, a secure means of transferring sensitive information in any publicly accessible communication infrastructure is a major concern. In particular, authenticated and confidential communication is of paramount importance. In this paper, we describe the implementation of a paradigm where advanced security services are offered by the ISDN infrastructure as an additional service. The encryption model is based on transparently integrating the security devices into the ISDN network termination (NT). This makes the approach independent from both the terminal equipment (TE), and the service used, as well as independent from the ISDN switches and exchanges installed by the service provider. The paper discusses integration of the security device into the ISDN architecture, as well as the design of a data encryption standard (DES) TripleDES encryption unit being the buttress of the ISDN security solution. Comparisons to related work and products in the field are made and the relation of the project to the broadband pendant to ISDN—broadband-ISDN (B-ISDN)—is sketched.
7 schema:editor N8d03e31e6afb40ff87f3bb0a34afb17d
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N536afb5ef3824af6a6ee350304be6fe5
12 schema:name ISDN Security Services
13 schema:pagination 21-35
14 schema:productId N13ba023370cf4338adac5ac143822ae3
15 Nc41f19d2a60e45e19071e31c8fe9f8b3
16 Ne6245dacab374ec086fdc60f6a7cff2d
17 schema:publisher Nbff48fa1571242bf853fc6fec7152c01
18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046358402
19 https://doi.org/10.1007/978-0-387-35568-9_2
20 schema:sdDatePublished 2019-04-15T21:47
21 schema:sdLicense https://scigraph.springernature.com/explorer/license/
22 schema:sdPublisher N6ea97240d7754e1fa4dff550fb7a765f
23 schema:url http://link.springer.com/10.1007/978-0-387-35568-9_2
24 sgo:license sg:explorer/license/
25 sgo:sdDataset chapters
26 rdf:type schema:Chapter
27 N13ba023370cf4338adac5ac143822ae3 schema:name dimensions_id
28 schema:value pub.1046358402
29 rdf:type schema:PropertyValue
30 N4590d12e1fc4400ea070fa59b3de2381 rdf:first sg:person.012516432633.90
31 rdf:rest Nd25d2a4dd83f4f669aa0f62d61858fcd
32 N4e6b098735f542b7a8375e15ed9e140b schema:familyName Preneel
33 schema:givenName Bart
34 rdf:type schema:Person
35 N536afb5ef3824af6a6ee350304be6fe5 schema:isbn 978-0-387-35568-9
36 978-1-4757-6487-1
37 schema:name Secure Information Networks
38 rdf:type schema:Book
39 N6ea97240d7754e1fa4dff550fb7a765f schema:name Springer Nature - SN SciGraph project
40 rdf:type schema:Organization
41 N8d03e31e6afb40ff87f3bb0a34afb17d rdf:first N4e6b098735f542b7a8375e15ed9e140b
42 rdf:rest rdf:nil
43 Nbff48fa1571242bf853fc6fec7152c01 schema:location Boston, MA
44 schema:name Springer US
45 rdf:type schema:Organisation
46 Nc41f19d2a60e45e19071e31c8fe9f8b3 schema:name doi
47 schema:value 10.1007/978-0-387-35568-9_2
48 rdf:type schema:PropertyValue
49 Nce618839bab345f980bb361896b9f0f1 rdf:first sg:person.011236005071.18
50 rdf:rest rdf:nil
51 Nd25d2a4dd83f4f669aa0f62d61858fcd rdf:first sg:person.013270133353.59
52 rdf:rest Nce618839bab345f980bb361896b9f0f1
53 Ne6245dacab374ec086fdc60f6a7cff2d schema:name readcube_id
54 schema:value dcd489943b27e724a3548248754ba64fbab08c626fdd50f86e394f53ddaaf8af
55 rdf:type schema:PropertyValue
56 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
57 schema:name Information and Computing Sciences
58 rdf:type schema:DefinedTerm
59 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
60 schema:name Data Format
61 rdf:type schema:DefinedTerm
62 sg:person.011236005071.18 schema:affiliation https://www.grid.ac/institutes/grid.410413.3
63 schema:familyName Posch
64 schema:givenName Reinhard
65 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18
66 rdf:type schema:Person
67 sg:person.012516432633.90 schema:affiliation https://www.grid.ac/institutes/grid.410413.3
68 schema:familyName Leitold
69 schema:givenName Herbert
70 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
71 rdf:type schema:Person
72 sg:person.013270133353.59 schema:affiliation https://www.grid.ac/institutes/grid.410413.3
73 schema:familyName Posch
74 schema:givenName Karl Christian
75 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013270133353.59
76 rdf:type schema:Person
77 https://www.grid.ac/institutes/grid.410413.3 schema:alternateName Graz University of Technology
78 schema:name Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010 Graz, Austria
79 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...