2000
AUTHORSHerbert Leitold , Reinhard Posch
ABSTRACTBroadband networks based on the asynchronous transfer mode (ATM) are emerging rapidly. Both the technological component in terms of ATM infrastructure, as well as the area of applications requiring Quality of Services (QoS) by the means of bandwidth or delay constraints are covered by a variety of projects and products. However, given the increasing interest in applications such as governmental communication, transmission of medical information, or commercial applications, the necessity of providing secure means of delivering sensitive contents is apparent.In this paper, we focus on security services in ATM networks. The variety of different approaches and solutions are categorised by the means of its common and distinct functionality, as well as certain advantages and disadvantages are discussed. In addition, the standardisation efforts by the leading group in that area—the ATM Forum—are outlined. Finally, the essentials of the project SCAN3 are given, resulting in a comprehensive solution to security services in ATM networks. More... »
PAGES191-204
Intelligence in Networks
ISBN
978-1-4757-1022-9
978-0-387-35581-8
http://scigraph.springernature.com/pub.10.1007/978-0-387-35581-8_16
DOIhttp://dx.doi.org/10.1007/978-0-387-35581-8_16
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1022876172
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria",
"id": "http://www.grid.ac/institutes/grid.410413.3",
"name": [
"Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria"
],
"type": "Organization"
},
"familyName": "Leitold",
"givenName": "Herbert",
"id": "sg:person.012516432633.90",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria",
"id": "http://www.grid.ac/institutes/grid.410413.3",
"name": [
"Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria"
],
"type": "Organization"
},
"familyName": "Posch",
"givenName": "Reinhard",
"id": "sg:person.011236005071.18",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18"
],
"type": "Person"
}
],
"datePublished": "2000",
"datePublishedReg": "2000-01-01",
"description": "Broadband networks based on the asynchronous transfer mode (ATM) are emerging rapidly. Both the technological component in terms of ATM infrastructure, as well as the area of applications requiring Quality of Services (QoS) by the means of bandwidth or delay constraints are covered by a variety of projects and products. However, given the increasing interest in applications such as governmental communication, transmission of medical information, or commercial applications, the necessity of providing secure means of delivering sensitive contents is apparent.In this paper, we focus on security services in ATM networks. The variety of different approaches and solutions are categorised by the means of its common and distinct functionality, as well as certain advantages and disadvantages are discussed. In addition, the standardisation efforts by the leading group in that area\u2014the ATM Forum\u2014are outlined. Finally, the essentials of the project SCAN3 are given, resulting in a comprehensive solution to security services in ATM networks.",
"editor": [
{
"familyName": "Yongchareon",
"givenName": "Thongchai",
"type": "Person"
},
{
"familyName": "Aagesen",
"givenName": "Finn Arve",
"type": "Person"
},
{
"familyName": "Wuwongse",
"givenName": "Vilas",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-0-387-35581-8_16",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-1-4757-1022-9",
"978-0-387-35581-8"
],
"name": "Intelligence in Networks",
"type": "Book"
},
"keywords": [
"asynchronous transfer mode",
"security services",
"ATM networks",
"quality of service",
"network security",
"sensitive content",
"ATM infrastructure",
"secure means",
"broadband networks",
"standardisation efforts",
"delay constraints",
"ATM Forum",
"comprehensive solution",
"medical information",
"areas of application",
"technological components",
"network",
"variety of projects",
"transfer mode",
"governmental communication",
"commercial applications",
"distinct functionalities",
"services",
"different approaches",
"applications",
"security",
"infrastructure",
"bandwidth",
"functionality",
"communication",
"certain advantages",
"constraints",
"information",
"solution",
"transmission",
"project",
"advantages",
"forum",
"means",
"variety",
"quality",
"disadvantages",
"efforts",
"necessity",
"interest",
"area",
"terms",
"mode",
"paper",
"components",
"products",
"approach",
"addition",
"content",
"essential",
"group"
],
"name": "ATM Network Security",
"pagination": "191-204",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1022876172"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-0-387-35581-8_16"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-0-387-35581-8_16",
"https://app.dimensions.ai/details/publication/pub.1022876172"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-20T07:49",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_59.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-0-387-35581-8_16"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35581-8_16'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35581-8_16'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35581-8_16'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35581-8_16'
This table displays all metadata directly associated to this object as RDF triples.
133 TRIPLES
23 PREDICATES
82 URIs
75 LITERALS
7 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:pub.10.1007/978-0-387-35581-8_16 | schema:about | anzsrc-for:08 |
2 | ″ | ″ | anzsrc-for:0804 |
3 | ″ | schema:author | Neab05dd509334dde80590ee050dc29b0 |
4 | ″ | schema:datePublished | 2000 |
5 | ″ | schema:datePublishedReg | 2000-01-01 |
6 | ″ | schema:description | Broadband networks based on the asynchronous transfer mode (ATM) are emerging rapidly. Both the technological component in terms of ATM infrastructure, as well as the area of applications requiring Quality of Services (QoS) by the means of bandwidth or delay constraints are covered by a variety of projects and products. However, given the increasing interest in applications such as governmental communication, transmission of medical information, or commercial applications, the necessity of providing secure means of delivering sensitive contents is apparent.In this paper, we focus on security services in ATM networks. The variety of different approaches and solutions are categorised by the means of its common and distinct functionality, as well as certain advantages and disadvantages are discussed. In addition, the standardisation efforts by the leading group in that area—the ATM Forum—are outlined. Finally, the essentials of the project SCAN3 are given, resulting in a comprehensive solution to security services in ATM networks. |
7 | ″ | schema:editor | N6341753e7b86414dab0fae757f6e1238 |
8 | ″ | schema:genre | chapter |
9 | ″ | schema:inLanguage | en |
10 | ″ | schema:isAccessibleForFree | true |
11 | ″ | schema:isPartOf | N4ae9e01f86654b27aa8367068bceaad0 |
12 | ″ | schema:keywords | ATM Forum |
13 | ″ | ″ | ATM infrastructure |
14 | ″ | ″ | ATM networks |
15 | ″ | ″ | addition |
16 | ″ | ″ | advantages |
17 | ″ | ″ | applications |
18 | ″ | ″ | approach |
19 | ″ | ″ | area |
20 | ″ | ″ | areas of application |
21 | ″ | ″ | asynchronous transfer mode |
22 | ″ | ″ | bandwidth |
23 | ″ | ″ | broadband networks |
24 | ″ | ″ | certain advantages |
25 | ″ | ″ | commercial applications |
26 | ″ | ″ | communication |
27 | ″ | ″ | components |
28 | ″ | ″ | comprehensive solution |
29 | ″ | ″ | constraints |
30 | ″ | ″ | content |
31 | ″ | ″ | delay constraints |
32 | ″ | ″ | different approaches |
33 | ″ | ″ | disadvantages |
34 | ″ | ″ | distinct functionalities |
35 | ″ | ″ | efforts |
36 | ″ | ″ | essential |
37 | ″ | ″ | forum |
38 | ″ | ″ | functionality |
39 | ″ | ″ | governmental communication |
40 | ″ | ″ | group |
41 | ″ | ″ | information |
42 | ″ | ″ | infrastructure |
43 | ″ | ″ | interest |
44 | ″ | ″ | means |
45 | ″ | ″ | medical information |
46 | ″ | ″ | mode |
47 | ″ | ″ | necessity |
48 | ″ | ″ | network |
49 | ″ | ″ | network security |
50 | ″ | ″ | paper |
51 | ″ | ″ | products |
52 | ″ | ″ | project |
53 | ″ | ″ | quality |
54 | ″ | ″ | quality of service |
55 | ″ | ″ | secure means |
56 | ″ | ″ | security |
57 | ″ | ″ | security services |
58 | ″ | ″ | sensitive content |
59 | ″ | ″ | services |
60 | ″ | ″ | solution |
61 | ″ | ″ | standardisation efforts |
62 | ″ | ″ | technological components |
63 | ″ | ″ | terms |
64 | ″ | ″ | transfer mode |
65 | ″ | ″ | transmission |
66 | ″ | ″ | variety |
67 | ″ | ″ | variety of projects |
68 | ″ | schema:name | ATM Network Security |
69 | ″ | schema:pagination | 191-204 |
70 | ″ | schema:productId | N9131293ce2c046e88299917a4bcec615 |
71 | ″ | ″ | Nf721d9b5135f4adf9d654f6890922399 |
72 | ″ | schema:publisher | N96ab7fbf7533443b8c66ebc627a9018c |
73 | ″ | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1022876172 |
74 | ″ | ″ | https://doi.org/10.1007/978-0-387-35581-8_16 |
75 | ″ | schema:sdDatePublished | 2022-05-20T07:49 |
76 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
77 | ″ | schema:sdPublisher | Nb0383836da3945fa9d22401aa721739d |
78 | ″ | schema:url | https://doi.org/10.1007/978-0-387-35581-8_16 |
79 | ″ | sgo:license | sg:explorer/license/ |
80 | ″ | sgo:sdDataset | chapters |
81 | ″ | rdf:type | schema:Chapter |
82 | N1c2f09fe487c41b7b1f372fc10231f4e | rdf:first | sg:person.011236005071.18 |
83 | ″ | rdf:rest | rdf:nil |
84 | N4ae9e01f86654b27aa8367068bceaad0 | schema:isbn | 978-0-387-35581-8 |
85 | ″ | ″ | 978-1-4757-1022-9 |
86 | ″ | schema:name | Intelligence in Networks |
87 | ″ | rdf:type | schema:Book |
88 | N6341753e7b86414dab0fae757f6e1238 | rdf:first | N94626727805243c399275d4e3ead13fb |
89 | ″ | rdf:rest | Ndc0e6da6db5744a3818f53d7e36f4b27 |
90 | N7870b7eacd174398814ce82ea6704a1f | schema:familyName | Wuwongse |
91 | ″ | schema:givenName | Vilas |
92 | ″ | rdf:type | schema:Person |
93 | N7deef18bb08c4574976291168db9e8b6 | rdf:first | N7870b7eacd174398814ce82ea6704a1f |
94 | ″ | rdf:rest | rdf:nil |
95 | N9131293ce2c046e88299917a4bcec615 | schema:name | dimensions_id |
96 | ″ | schema:value | pub.1022876172 |
97 | ″ | rdf:type | schema:PropertyValue |
98 | N94626727805243c399275d4e3ead13fb | schema:familyName | Yongchareon |
99 | ″ | schema:givenName | Thongchai |
100 | ″ | rdf:type | schema:Person |
101 | N96ab7fbf7533443b8c66ebc627a9018c | schema:name | Springer Nature |
102 | ″ | rdf:type | schema:Organisation |
103 | Nb0383836da3945fa9d22401aa721739d | schema:name | Springer Nature - SN SciGraph project |
104 | ″ | rdf:type | schema:Organization |
105 | Ndc0e6da6db5744a3818f53d7e36f4b27 | rdf:first | Ndd7042d80b954515bbe8e25914926698 |
106 | ″ | rdf:rest | N7deef18bb08c4574976291168db9e8b6 |
107 | Ndd7042d80b954515bbe8e25914926698 | schema:familyName | Aagesen |
108 | ″ | schema:givenName | Finn Arve |
109 | ″ | rdf:type | schema:Person |
110 | Neab05dd509334dde80590ee050dc29b0 | rdf:first | sg:person.012516432633.90 |
111 | ″ | rdf:rest | N1c2f09fe487c41b7b1f372fc10231f4e |
112 | Nf721d9b5135f4adf9d654f6890922399 | schema:name | doi |
113 | ″ | schema:value | 10.1007/978-0-387-35581-8_16 |
114 | ″ | rdf:type | schema:PropertyValue |
115 | anzsrc-for:08 | schema:inDefinedTermSet | anzsrc-for: |
116 | ″ | schema:name | Information and Computing Sciences |
117 | ″ | rdf:type | schema:DefinedTerm |
118 | anzsrc-for:0804 | schema:inDefinedTermSet | anzsrc-for: |
119 | ″ | schema:name | Data Format |
120 | ″ | rdf:type | schema:DefinedTerm |
121 | sg:person.011236005071.18 | schema:affiliation | grid-institutes:grid.410413.3 |
122 | ″ | schema:familyName | Posch |
123 | ″ | schema:givenName | Reinhard |
124 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011236005071.18 |
125 | ″ | rdf:type | schema:Person |
126 | sg:person.012516432633.90 | schema:affiliation | grid-institutes:grid.410413.3 |
127 | ″ | schema:familyName | Leitold |
128 | ″ | schema:givenName | Herbert |
129 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90 |
130 | ″ | rdf:type | schema:Person |
131 | grid-institutes:grid.410413.3 | schema:alternateName | Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria |
132 | ″ | schema:name | Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria |
133 | ″ | rdf:type | schema:Organization |