{"id":"https://openalex.org/W1970276476","doi":"https://doi.org/10.1109/noms.2010.5488349","title":"Secure setup of inter-provider Ethernet services based on a novel naming schema","display_name":"Secure setup of inter-provider Ethernet services based on a novel naming schema","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1970276476","doi":"https://doi.org/10.1109/noms.2010.5488349","mag":"1970276476"},"language":"en","primary_location":{"id":"doi:10.1109/noms.2010.5488349","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2010.5488349","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE Network Operations and Management Symposium - NOMS 2010","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070005609","display_name":"Bernhard Lichtinger","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163716","display_name":"Leibniz Supercomputing Centre","ror":"https://ror.org/05558nw16","country_code":"DE","type":"facility","lineage":["https://openalex.org/I109144446","https://openalex.org/I4210163716"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Bernhard Lichtinger","raw_affiliation_strings":["Leibniz Supercomputing Centre, Germany"],"affiliations":[{"raw_affiliation_string":"Leibniz Supercomputing Centre, Germany","institution_ids":["https://openalex.org/I4210163716"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055759567","display_name":"Oliver Hanka","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Oliver Hanka","raw_affiliation_strings":["Technische Universit\u00e4t M\u00fcnchen, Germany","Technische Universitat, Munchen, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I62916508"]},{"raw_affiliation_string":"Technische Universitat, Munchen, Germany#TAB#","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5070005609"],"corresponding_institution_ids":["https://openalex.org/I4210163716"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07014121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"886","last_page":"889"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7740881443023682},{"id":"https://openalex.org/keywords/ethernet-over-pdh","display_name":"Ethernet over PDH","score":0.7328206300735474},{"id":"https://openalex.org/keywords/carrier-ethernet","display_name":"Carrier Ethernet","score":0.7301971912384033},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7031705975532532},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5916290283203125},{"id":"https://openalex.org/keywords/connection-oriented-ethernet","display_name":"Connection-oriented Ethernet","score":0.5818530917167664},{"id":"https://openalex.org/keywords/metro-ethernet","display_name":"Metro Ethernet","score":0.5489464998245239},{"id":"https://openalex.org/keywords/ethernet-over-sdh","display_name":"Ethernet over SDH","score":0.489940345287323},{"id":"https://openalex.org/keywords/lightweight-directory-access-protocol","display_name":"Lightweight Directory Access Protocol","score":0.47501882910728455},{"id":"https://openalex.org/keywords/namespace","display_name":"Namespace","score":0.47371286153793335},{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.46582600474357605},{"id":"https://openalex.org/keywords/ethernet","display_name":"Ethernet","score":0.44095584750175476},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33286505937576294},{"id":"https://openalex.org/keywords/ethernet-flow-control","display_name":"Ethernet flow control","score":0.2666305899620056},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1462598443031311},{"id":"https://openalex.org/keywords/directory","display_name":"Directory","score":0.05823063850402832}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7740881443023682},{"id":"https://openalex.org/C195801177","wikidata":"https://www.wikidata.org/wiki/Q5403360","display_name":"Ethernet over PDH","level":5,"score":0.7328206300735474},{"id":"https://openalex.org/C151898751","wikidata":"https://www.wikidata.org/wiki/Q5046350","display_name":"Carrier Ethernet","level":3,"score":0.7301971912384033},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7031705975532532},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5916290283203125},{"id":"https://openalex.org/C186844356","wikidata":"https://www.wikidata.org/wiki/Q5161679","display_name":"Connection-oriented Ethernet","level":4,"score":0.5818530917167664},{"id":"https://openalex.org/C151643298","wikidata":"https://www.wikidata.org/wiki/Q3050434","display_name":"Metro Ethernet","level":4,"score":0.5489464998245239},{"id":"https://openalex.org/C30188135","wikidata":"https://www.wikidata.org/wiki/Q1118613","display_name":"Ethernet over SDH","level":4,"score":0.489940345287323},{"id":"https://openalex.org/C181177684","wikidata":"https://www.wikidata.org/wiki/Q188816","display_name":"Lightweight Directory Access Protocol","level":3,"score":0.47501882910728455},{"id":"https://openalex.org/C2778383056","wikidata":"https://www.wikidata.org/wiki/Q873636","display_name":"Namespace","level":2,"score":0.47371286153793335},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.46582600474357605},{"id":"https://openalex.org/C172173386","wikidata":"https://www.wikidata.org/wiki/Q79984","display_name":"Ethernet","level":2,"score":0.44095584750175476},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33286505937576294},{"id":"https://openalex.org/C68178114","wikidata":"https://www.wikidata.org/wiki/Q5403359","display_name":"Ethernet flow control","level":3,"score":0.2666305899620056},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1462598443031311},{"id":"https://openalex.org/C2777683733","wikidata":"https://www.wikidata.org/wiki/Q201456","display_name":"Directory","level":2,"score":0.05823063850402832},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/noms.2010.5488349","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2010.5488349","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE Network Operations and Management Symposium - NOMS 2010","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2018501701","https://openalex.org/W2111427271","https://openalex.org/W2145721479","https://openalex.org/W2156186849","https://openalex.org/W4213362721","https://openalex.org/W4300490703","https://openalex.org/W6640380507","https://openalex.org/W6676547511"],"related_works":["https://openalex.org/W1847828040","https://openalex.org/W68203582","https://openalex.org/W2143416365","https://openalex.org/W2532805020","https://openalex.org/W2130064502","https://openalex.org/W1614152707","https://openalex.org/W1982626884","https://openalex.org/W2336126866","https://openalex.org/W2166475922","https://openalex.org/W1850940859"],"abstract_inverted_index":{"With":[0],"the":[1,58,62,78],"emergence":[2],"of":[3,64,91],"Ethernet":[4,10,32,92],"services":[5],"based":[6],"on":[7],"carrier":[8],"grade":[9],"as":[11],"transport":[12],"technology":[13],"in":[14],"metro":[15],"and":[16,88],"backbone":[17],"networks":[18],"a":[19,27,46,74],"new":[20],"addressing":[21],"schema":[22,49],"is":[23],"required":[24],"to":[25,72,86],"achieve":[26],"global":[28],"namespace.":[29],"As":[30],"native":[31],"does":[33],"not":[34],"provide":[35],"unique":[36],"identifiers,":[37,56],"which":[38,50],"are":[39,70],"needed":[40],"for":[41,52],"inter-provider":[42],"services,":[43],"we":[44,82],"propose":[45,83],"novel":[47],"naming":[48],"allows":[51],"human":[53],"readable":[54],"endpoint":[55],"at":[57],"same":[59],"time":[60],"avoiding":[61],"disclosure":[63],"provider":[65],"internal":[66],"structures.":[67],"These":[68],"addresses":[69],"used":[71],"establish":[73],"connection":[75],"path":[76],"suiting":[77],"customers'":[79],"needs.":[80],"Additionally":[81],"security":[84],"mechanisms":[85],"authenticate":[87],"authorize":[89],"peers":[90],"services.":[93]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
