{"title":"ATM网络的安全信令和访问控制","authors":"R. Shankaran, V. Varadharajan","doi":"10.1109/CSAC.1998.738622","DOIUrl":null,"url":null,"abstract":"Asynchronous transfer mode (ATM) is seen to be a technology that allows flexibility, efficiency and manageable bandwidth on demand to be achieved in high-speed networks. ATM is able to support a variety of applications, including voice, video, image and data, with different quality-of-service (QoS) requirements. This paper addresses the design of security services in ATM networks. It considers the placement of a security layer between the ATM adaptation layer (AAL) and the ATM layer that provides confidentiality, integrity and data origin authentication in the user plane. The paper then considers secure signaling and describes a public key-based authentication and key management protocol that can be integrated as part of secure call setup. This protocol is part of an overall public key infrastructure framework for ATM networks. Finally, the paper discusses the issues involved in the provision of an access control service at the connection setup phase and the user data transfer phase.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure signaling and access control for ATM networks\",\"authors\":\"R. Shankaran, V. Varadharajan\",\"doi\":\"10.1109/CSAC.1998.738622\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Asynchronous transfer mode (ATM) is seen to be a technology that allows flexibility, efficiency and manageable bandwidth on demand to be achieved in high-speed networks. ATM is able to support a variety of applications, including voice, video, image and data, with different quality-of-service (QoS) requirements. This paper addresses the design of security services in ATM networks. It considers the placement of a security layer between the ATM adaptation layer (AAL) and the ATM layer that provides confidentiality, integrity and data origin authentication in the user plane. The paper then considers secure signaling and describes a public key-based authentication and key management protocol that can be integrated as part of secure call setup. This protocol is part of an overall public key infrastructure framework for ATM networks. Finally, the paper discusses the issues involved in the provision of an access control service at the connection setup phase and the user data transfer phase.\",\"PeriodicalId\":426526,\"journal\":{\"name\":\"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-12-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAC.1998.738622\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1998.738622","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure signaling and access control for ATM networks
Asynchronous transfer mode (ATM) is seen to be a technology that allows flexibility, efficiency and manageable bandwidth on demand to be achieved in high-speed networks. ATM is able to support a variety of applications, including voice, video, image and data, with different quality-of-service (QoS) requirements. This paper addresses the design of security services in ATM networks. It considers the placement of a security layer between the ATM adaptation layer (AAL) and the ATM layer that provides confidentiality, integrity and data origin authentication in the user plane. The paper then considers secure signaling and describes a public key-based authentication and key management protocol that can be integrated as part of secure call setup. This protocol is part of an overall public key infrastructure framework for ATM networks. Finally, the paper discusses the issues involved in the provision of an access control service at the connection setup phase and the user data transfer phase.