Security issues in asynchronous transfer mode

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)

Abstract

This paper addresses the design and management of security services for ATM networks. Various options for the positioning of security services within the ATM protocol stack are discussed. After considering these possibilities, it is proposed to place the security layer between the AAL and ATM layers. The proposed security layer provides confidentiality, integrity and data origin authentication in the user plane. The developed security design can be transparently integrated into the B-ISDN Protocol Reference Model without in any way violating the existing standards.

Original languageEnglish
Title of host publicationInformation Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages76-89
Number of pages14
Volume1270
ISBN (Print)3540632328, 9783540632320
DOIs
Publication statusPublished - 1997
Externally publishedYes
Event2nd Australasian Conference on Information Security and Privacy, ACISP - 1997 - Sydney, Australia
Duration: 7 Jul 19979 Jul 1997

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1270
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2nd Australasian Conference on Information Security and Privacy, ACISP - 1997
Country/TerritoryAustralia
CitySydney
Period7/07/979/07/97

Keywords

  • ATM security
  • Security layer for ATM
  • Security services

Fingerprint

Dive into the research topics of 'Security issues in asynchronous transfer mode'. Together they form a unique fingerprint.

Cite this