{"title":"ATM网络中按需安全的集成方法","authors":"H. J. Schumacher, Sumit Ghosh","doi":"10.1080/10658989809342545","DOIUrl":null,"url":null,"abstract":"This article Introduces a conceptual framework for network security that provides a basis to address, fundamentally, every weakness In a given network. The principal objective of the frame work Is to provide a basis to determine the resulting security of a composite network that Is formed from connecting two or more networks with known security. Using asynchronous transfer mode (ATM), this framework can facilitate electronic commerce by devising fixed routing across networks of known security.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"An Integrated Approach to Security on Demand in ATM Networks\",\"authors\":\"H. J. Schumacher, Sumit Ghosh\",\"doi\":\"10.1080/10658989809342545\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article Introduces a conceptual framework for network security that provides a basis to address, fundamentally, every weakness In a given network. The principal objective of the frame work Is to provide a basis to determine the resulting security of a composite network that Is formed from connecting two or more networks with known security. Using asynchronous transfer mode (ATM), this framework can facilitate electronic commerce by devising fixed routing across networks of known security.\",\"PeriodicalId\":207082,\"journal\":{\"name\":\"Inf. Secur. J. A Glob. Perspect.\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inf. Secur. J. A Glob. Perspect.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/10658989809342545\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/10658989809342545","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Integrated Approach to Security on Demand in ATM Networks
This article Introduces a conceptual framework for network security that provides a basis to address, fundamentally, every weakness In a given network. The principal objective of the frame work Is to provide a basis to determine the resulting security of a composite network that Is formed from connecting two or more networks with known security. Using asynchronous transfer mode (ATM), this framework can facilitate electronic commerce by devising fixed routing across networks of known security.