ATM Security Scope and Requirements
Author
Mohammad Peyravian,Els Van Herreweghen
Entry type
techreport
Abstract
This contribution identifies security scope and requirements in ATM
networks. It first discusses general network security services and
identifies the security service required in ATM. It then considers three
scenarios: the end-to-end case (securing ATM connections between the
ATM endpoints), the edge-to-edge case (securing the part of a connection
crossing a public network), and the endpoint-to-switch case (securing
ATM connection between and ATM endpoint and a switch). It further
elaborates on the issue of authenticated (and other security related)
signalling treated in previous contributions and suggests a clear
separation between the authentication needed at the ATM level on one side
and the higher-level (end-user) authentication needed by network and
service providers on the other side. Finally, it is suggested how to
include different levels of authentication information in ATM signalling
messages.
Date
1995 – June
Institution
IBM Corporation - Research Laboratory
Key alpha
Peyravian
Publication Date
0000-00-00
Location
A hard-copy of this is in the Papers Cabinet

