ATM Security View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2000

AUTHORS

Herbert Leitold

ABSTRACT

With the increasing deployment of asynchronous transfer mode (ATM) in both local area network (LAN), and wide area network (WAN) environments the interest in secure means of transferring sensitive information over ATM increases. Given potential application fields requiring Quality of Services (QoS) provided by ATM, as divers as transferring medical images, linking branch offices to company networks, or governmental networks transferring sensitive citizen information, security is not only a desired option, it is rather an indispensable necessity.The weakness of solutions to security in ATM networks has been recognised early. Cryptography is the tool of choice to achieve secure communications and a couple of proposals appeared to integrate cryptographic functions into ATM. Products have been developed which at the beginning faced the uncertainty of missing standards frameworks. However, this issue has been made up, as the ATM Forum has recently approved the Security Specification 1.0 which is an fact a comprehensive standardisation effort building the buttress for interoperable products.In this tutorial, the ATM security arena is surveyed. It first gives an explanatory overview of ATM as a technology and addresses the challenges specific to ATM when aiming to migrate ATM to a secure infrastructure. Basing on these challenges, promising approaches to achieve security in ATM networks are described. By assessing the specific advantages and disadvantages, a comparison of the approaches against the ATM Forum Security Specification is made. In its final part, the tutorial surveys products that are already available on the market or are announced by manufacturers working on ATM security. More... »

PAGES

35-44

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-0-387-35581-8_4

DOI

http://dx.doi.org/10.1007/978-0-387-35581-8_4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1050506852


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Leitold", 
        "givenName": "Herbert", 
        "id": "sg:person.012516432633.90", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2000", 
    "datePublishedReg": "2000-01-01", 
    "description": "With the increasing deployment of asynchronous transfer mode (ATM) in both local area network (LAN), and wide area network (WAN) environments the interest in secure means of transferring sensitive information over ATM increases. Given potential application fields requiring Quality of Services (QoS) provided by ATM, as divers as transferring medical images, linking branch offices to company networks, or governmental networks transferring sensitive citizen information, security is not only a desired option, it is rather an indispensable necessity.The weakness of solutions to security in ATM networks has been recognised early. Cryptography is the tool of choice to achieve secure communications and a couple of proposals appeared to integrate cryptographic functions into ATM. Products have been developed which at the beginning faced the uncertainty of missing standards frameworks. However, this issue has been made up, as the ATM Forum has recently approved the Security Specification 1.0 which is an fact a comprehensive standardisation effort building the buttress for interoperable products.In this tutorial, the ATM security arena is surveyed. It first gives an explanatory overview of ATM as a technology and addresses the challenges specific to ATM when aiming to migrate ATM to a secure infrastructure. Basing on these challenges, promising approaches to achieve security in ATM networks are described. By assessing the specific advantages and disadvantages, a comparison of the approaches against the ATM Forum Security Specification is made. In its final part, the tutorial surveys products that are already available on the market or are announced by manufacturers working on ATM security.", 
    "editor": [
      {
        "familyName": "Yongchareon", 
        "givenName": "Thongchai", 
        "type": "Person"
      }, 
      {
        "familyName": "Aagesen", 
        "givenName": "Finn Arve", 
        "type": "Person"
      }, 
      {
        "familyName": "Wuwongse", 
        "givenName": "Vilas", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-0-387-35581-8_4", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-1-4757-1022-9", 
        "978-0-387-35581-8"
      ], 
      "name": "Intelligence in Networks", 
      "type": "Book"
    }, 
    "keywords": [
      "asynchronous transfer mode", 
      "wide area networks", 
      "local area networks", 
      "ATM security", 
      "ATM networks", 
      "area networks", 
      "quality of service", 
      "security specifications", 
      "secure infrastructure", 
      "sensitive information", 
      "medical images", 
      "secure communication", 
      "cryptographic functions", 
      "secure means", 
      "standardisation efforts", 
      "interoperable products", 
      "company networks", 
      "ATM Forum", 
      "security", 
      "network", 
      "application fields", 
      "citizen information", 
      "governmental networks", 
      "transfer mode", 
      "potential application fields", 
      "tool of choice", 
      "couple of proposals", 
      "security arena", 
      "cryptography", 
      "promising approach", 
      "information", 
      "branch offices", 
      "infrastructure", 
      "deployment", 
      "specification", 
      "tutorial", 
      "challenges", 
      "images", 
      "communication", 
      "services", 
      "technology", 
      "indispensable necessity", 
      "explanatory overview", 
      "survey products", 
      "proposal", 
      "tool", 
      "advantages", 
      "ATM increases", 
      "issues", 
      "final part", 
      "specific advantages", 
      "forum", 
      "quality", 
      "solution", 
      "standards", 
      "disadvantages", 
      "uncertainty", 
      "overview", 
      "efforts", 
      "weakness", 
      "necessity", 
      "manufacturers", 
      "interest", 
      "office", 
      "field", 
      "means", 
      "fact", 
      "part", 
      "market", 
      "arena", 
      "choice", 
      "function", 
      "divers", 
      "products", 
      "mode", 
      "comparison", 
      "options", 
      "couples", 
      "beginning", 
      "increase", 
      "buttress", 
      "approach", 
      "sensitive citizen information", 
      "weakness of solutions", 
      "Security Specification 1.0", 
      "Specification 1.0", 
      "comprehensive standardisation effort", 
      "ATM security arena", 
      "ATM Forum Security Specification", 
      "Forum Security Specification", 
      "tutorial surveys products"
    ], 
    "name": "ATM Security", 
    "pagination": "35-44", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1050506852"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-0-387-35581-8_4"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-0-387-35581-8_4", 
      "https://app.dimensions.ai/details/publication/pub.1050506852"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:18", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_318.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-0-387-35581-8_4"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35581-8_4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35581-8_4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35581-8_4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-0-387-35581-8_4'


 

This table displays all metadata directly associated to this object as RDF triples.

161 TRIPLES      23 PREDICATES      117 URIs      110 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-0-387-35581-8_4 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N9144d93a8b764eb687b6134c69403546
4 schema:datePublished 2000
5 schema:datePublishedReg 2000-01-01
6 schema:description With the increasing deployment of asynchronous transfer mode (ATM) in both local area network (LAN), and wide area network (WAN) environments the interest in secure means of transferring sensitive information over ATM increases. Given potential application fields requiring Quality of Services (QoS) provided by ATM, as divers as transferring medical images, linking branch offices to company networks, or governmental networks transferring sensitive citizen information, security is not only a desired option, it is rather an indispensable necessity.The weakness of solutions to security in ATM networks has been recognised early. Cryptography is the tool of choice to achieve secure communications and a couple of proposals appeared to integrate cryptographic functions into ATM. Products have been developed which at the beginning faced the uncertainty of missing standards frameworks. However, this issue has been made up, as the ATM Forum has recently approved the Security Specification 1.0 which is an fact a comprehensive standardisation effort building the buttress for interoperable products.In this tutorial, the ATM security arena is surveyed. It first gives an explanatory overview of ATM as a technology and addresses the challenges specific to ATM when aiming to migrate ATM to a secure infrastructure. Basing on these challenges, promising approaches to achieve security in ATM networks are described. By assessing the specific advantages and disadvantages, a comparison of the approaches against the ATM Forum Security Specification is made. In its final part, the tutorial surveys products that are already available on the market or are announced by manufacturers working on ATM security.
7 schema:editor Nb7f480988f3e4981ada0a3d1a093e96e
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N9404afd61210475c9ca4ab6d3c5434b8
12 schema:keywords ATM Forum
13 ATM Forum Security Specification
14 ATM increases
15 ATM networks
16 ATM security
17 ATM security arena
18 Forum Security Specification
19 Security Specification 1.0
20 Specification 1.0
21 advantages
22 application fields
23 approach
24 area networks
25 arena
26 asynchronous transfer mode
27 beginning
28 branch offices
29 buttress
30 challenges
31 choice
32 citizen information
33 communication
34 company networks
35 comparison
36 comprehensive standardisation effort
37 couple of proposals
38 couples
39 cryptographic functions
40 cryptography
41 deployment
42 disadvantages
43 divers
44 efforts
45 explanatory overview
46 fact
47 field
48 final part
49 forum
50 function
51 governmental networks
52 images
53 increase
54 indispensable necessity
55 information
56 infrastructure
57 interest
58 interoperable products
59 issues
60 local area networks
61 manufacturers
62 market
63 means
64 medical images
65 mode
66 necessity
67 network
68 office
69 options
70 overview
71 part
72 potential application fields
73 products
74 promising approach
75 proposal
76 quality
77 quality of service
78 secure communication
79 secure infrastructure
80 secure means
81 security
82 security arena
83 security specifications
84 sensitive citizen information
85 sensitive information
86 services
87 solution
88 specific advantages
89 specification
90 standardisation efforts
91 standards
92 survey products
93 technology
94 tool
95 tool of choice
96 transfer mode
97 tutorial
98 tutorial surveys products
99 uncertainty
100 weakness
101 weakness of solutions
102 wide area networks
103 schema:name ATM Security
104 schema:pagination 35-44
105 schema:productId N99a4b67630794bef8489c1304be1a6df
106 Ndd56f69a457644e59117349ab7f4e419
107 schema:publisher Nb50b6696e5634a6eae2d4247e73bb2e5
108 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050506852
109 https://doi.org/10.1007/978-0-387-35581-8_4
110 schema:sdDatePublished 2022-01-01T19:18
111 schema:sdLicense https://scigraph.springernature.com/explorer/license/
112 schema:sdPublisher N34c3600568a74e1eb04ed99b70adc1f4
113 schema:url https://doi.org/10.1007/978-0-387-35581-8_4
114 sgo:license sg:explorer/license/
115 sgo:sdDataset chapters
116 rdf:type schema:Chapter
117 N18d9a15a090d41158231b2e3edc1f99d rdf:first N94af346fa2494687b7928af31161d5ee
118 rdf:rest N800133016b3a418487756c0bf18a87e8
119 N34c3600568a74e1eb04ed99b70adc1f4 schema:name Springer Nature - SN SciGraph project
120 rdf:type schema:Organization
121 N6352bcdd332d4b2f8a3c4405749040a5 schema:familyName Wuwongse
122 schema:givenName Vilas
123 rdf:type schema:Person
124 N800133016b3a418487756c0bf18a87e8 rdf:first N6352bcdd332d4b2f8a3c4405749040a5
125 rdf:rest rdf:nil
126 N9144d93a8b764eb687b6134c69403546 rdf:first sg:person.012516432633.90
127 rdf:rest rdf:nil
128 N9404afd61210475c9ca4ab6d3c5434b8 schema:isbn 978-0-387-35581-8
129 978-1-4757-1022-9
130 schema:name Intelligence in Networks
131 rdf:type schema:Book
132 N94af346fa2494687b7928af31161d5ee schema:familyName Aagesen
133 schema:givenName Finn Arve
134 rdf:type schema:Person
135 N99a4b67630794bef8489c1304be1a6df schema:name doi
136 schema:value 10.1007/978-0-387-35581-8_4
137 rdf:type schema:PropertyValue
138 N9d0f5da4e1f441388084d38cb7ecfcd5 schema:familyName Yongchareon
139 schema:givenName Thongchai
140 rdf:type schema:Person
141 Nb50b6696e5634a6eae2d4247e73bb2e5 schema:name Springer Nature
142 rdf:type schema:Organisation
143 Nb7f480988f3e4981ada0a3d1a093e96e rdf:first N9d0f5da4e1f441388084d38cb7ecfcd5
144 rdf:rest N18d9a15a090d41158231b2e3edc1f99d
145 Ndd56f69a457644e59117349ab7f4e419 schema:name dimensions_id
146 schema:value pub.1050506852
147 rdf:type schema:PropertyValue
148 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
149 schema:name Information and Computing Sciences
150 rdf:type schema:DefinedTerm
151 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
152 schema:name Data Format
153 rdf:type schema:DefinedTerm
154 sg:person.012516432633.90 schema:affiliation grid-institutes:grid.410413.3
155 schema:familyName Leitold
156 schema:givenName Herbert
157 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012516432633.90
158 rdf:type schema:Person
159 grid-institutes:grid.410413.3 schema:alternateName Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria
160 schema:name Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010, Graz, Austria
161 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...