{"id":"https://openalex.org/W1965027506","doi":"https://doi.org/10.1142/s0219265903000969","title":"A Novel, User-Level, Security-On-Demand Paradigm for ATM Networks: Modeling, Simulation, and Performance Analysis","display_name":"A Novel, User-Level, Security-On-Demand Paradigm for ATM Networks: Modeling, Simulation, and Performance Analysis","publication_year":2003,"publication_date":"2003-12-01","ids":{"openalex":"https://openalex.org/W1965027506","doi":"https://doi.org/10.1142/s0219265903000969","mag":"1965027506"},"language":"en","primary_location":{"id":"doi:10.1142/s0219265903000969","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265903000969","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060188007","display_name":"H. J. Schumacher","orcid":null},"institutions":[{"id":"https://openalex.org/I192545095","display_name":"United States Military Academy","ror":"https://ror.org/01jepya76","country_code":"US","type":"education","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I192545095","https://openalex.org/I4210088792"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"H. J. (Jerry) Schumacher","raw_affiliation_strings":["Department of EE &amp; CS, US Military Academy, West Point, New York 10996, USA"],"affiliations":[{"raw_affiliation_string":"Department of EE &amp; CS, US Military Academy, West Point, New York 10996, USA","institution_ids":["https://openalex.org/I192545095"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070994105","display_name":"Tong Lee","orcid":"https://orcid.org/0000-0001-9817-2908"},"institutions":[{"id":"https://openalex.org/I4210109870","display_name":"Vi Technology (United States)","ror":"https://ror.org/016mnbp44","country_code":"US","type":"company","lineage":["https://openalex.org/I4210109870"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tony Lee","raw_affiliation_strings":["Vitria Technology, 945 Stewart Drive, Sunnyvvale, CA 94086, USA"],"affiliations":[{"raw_affiliation_string":"Vitria Technology, 945 Stewart Drive, Sunnyvvale, CA 94086, USA","institution_ids":["https://openalex.org/I4210109870"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079985569","display_name":"Sumit Ghosh","orcid":"https://orcid.org/0000-0002-1891-675X"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sumit Ghosh","raw_affiliation_strings":["Secure Network Systems Design Lab., Department of Electrical &amp; Computer Engineering, Stevens Institute of Technology, Hoboken, NJ07030, USA"],"affiliations":[{"raw_affiliation_string":"Secure Network Systems Design Lab., Department of Electrical &amp; Computer Engineering, Stevens Institute of Technology, Hoboken, NJ07030, USA","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060188007"],"corresponding_institution_ids":["https://openalex.org/I192545095"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.14123925,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"04","issue":"04","first_page":"429","last_page":"461"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7801617383956909},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5860273838043213},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.525899350643158},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.5126635432243347},{"id":"https://openalex.org/keywords/security-domain","display_name":"Security domain","score":0.4948663115501404},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.4905199408531189},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4893912374973297},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4733809530735016},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.43381866812705994},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41402125358581543},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3361486494541168},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2592768967151642}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7801617383956909},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5860273838043213},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.525899350643158},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.5126635432243347},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.4948663115501404},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.4905199408531189},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4893912374973297},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4733809530735016},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.43381866812705994},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41402125358581543},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3361486494541168},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2592768967151642},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0219265903000969","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219265903000969","pdf_url":null,"source":{"id":"https://openalex.org/S63112013","display_name":"Journal of Interconnection Networks","issn_l":"0219-2659","issn":["0219-2659","1793-6713"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Interconnection Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W610741251","https://openalex.org/W1559063645","https://openalex.org/W1581874932","https://openalex.org/W1588749215","https://openalex.org/W1757771748","https://openalex.org/W1968554208","https://openalex.org/W1987823527","https://openalex.org/W1991733428","https://openalex.org/W1994386233","https://openalex.org/W1998732688","https://openalex.org/W1998737366","https://openalex.org/W2014025508","https://openalex.org/W2015297508","https://openalex.org/W2024950116","https://openalex.org/W2034418153","https://openalex.org/W2035458271","https://openalex.org/W2041257875","https://openalex.org/W2043361728","https://openalex.org/W2046293542","https://openalex.org/W2058881700","https://openalex.org/W2062109595","https://openalex.org/W2065076704","https://openalex.org/W2065731354","https://openalex.org/W2070728834","https://openalex.org/W2095881341","https://openalex.org/W2104471945","https://openalex.org/W2107384724","https://openalex.org/W2111052290","https://openalex.org/W2121824862","https://openalex.org/W2146973388","https://openalex.org/W2157117197","https://openalex.org/W2169528473","https://openalex.org/W2170329506","https://openalex.org/W2485385707","https://openalex.org/W2505685872","https://openalex.org/W2876980590","https://openalex.org/W2967585309","https://openalex.org/W3018661803"],"related_works":["https://openalex.org/W1519114293","https://openalex.org/W2744631404","https://openalex.org/W130517179","https://openalex.org/W2151761340","https://openalex.org/W1550312117","https://openalex.org/W3012238031","https://openalex.org/W2339586525","https://openalex.org/W2372674753","https://openalex.org/W2153264224","https://openalex.org/W2068842798"],"abstract_inverted_index":{"With":[0],"networks":[1,50,198,615],"increasingly":[2],"moving":[3],"into":[4,611],"virtually":[5],"every":[6,295,359,463],"aspect":[7],"of":[8,22,44,118,121,140,151,192,197,210,220,282,297,334,355,380,404,480,490,534,558,577,585,639,661,664,689],"our":[9],"daily":[10],"life,":[11],"security":[12,43,87,155,180,218,290,308,313,322,336,370,587,610],"is":[13,103,115,230,272,304,317,363,371,385,416,459,493,505,519,528,641],"gaining":[14],"importance,":[15],"not":[16],"only":[17],"from":[18],"the":[19,25,42,81,86,91,98,107,116,122,131,134,137,146,190,200,213,216,231,253,259,275,283,289,293,298,321,325,332,335,339,348,352,356,368,388,393,399,412,421,425,439,468,491,496,500,526,555,559,570,578,604,626,637,662,665,671,681,690],"traditional":[20],"perspective":[21],"communication":[23],"but":[24],"network's":[26],"growing":[27],"role":[28],"in":[29,133,153,182,199,226,373,499,632,675],"modern":[30],"automation":[31],"and":[32,66,114,149,156,159,175,256,302,361,377,465,565,598,614,622,651],"control.":[33],"The":[34,143,186,456,488,502,552],"traditional,":[35],"certification":[36],"based":[37],"approach":[38,188,504],"attempts":[39],"to":[40,54,177,277,319,365,375,447,470,476,494,521,608,643,684],"guarantee":[41],"a":[45,55,60,73,183,193,238,242,248,262,279,307,328,410,434,445,448,474,481,485,508,532,542,574,658],"network":[46,82,99,126,154,163,228,239,299,401,422,441,469,590,691],"through":[47,97,327,347,594,670],"certification.":[48],"Certified":[49],"are":[51,63,678],"generally":[52],"confined":[53],"limited":[56],"domain":[57],"and,":[58,408],"as":[59,292,409,420,541,592,616,667],"result,":[61,411],"they":[62,668],"isolated,":[64],"costly,":[65],"under-utilized.":[67],"In":[68,602],"contrast,":[69,603],"this":[70],"paper":[71,432],"presents":[72],"new":[74],"principle":[75,102],"\u2013":[76,171,300],"user-level,":[77,285],"security-on-demand":[78,187,286],"system,":[79,672],"wherein":[80],"allocates,":[83],"where":[84],"possible,":[85],"resources":[88,337,688],"commensurate":[89],"with":[90,136,212,274],"user's":[92,249,254],"request":[93],"for":[94,106,125,247,324,484,507],"transporting":[95],"message(s)":[96],"securely.":[100],"This":[101,268,431],"successfully":[104,266],"demonstrated":[105],"current":[108],"Asynchronous":[109],"Transfer":[110],"Mode":[111],"(ATM)":[112],"networks,":[113,398],"result":[117],"an":[119,547,617],"integration":[120],"fundamental":[123,147],"framework":[124,144,276,291],"security,":[127],"recently":[128],"proposed":[129,503,562,579],"by":[130,207,252,306,473],"authors":[132],"literature,":[135],"unique":[138,224,269,435],"characteristics":[139,557],"ATM":[141,227,270,400,512,560,589],"networks.":[142],"encapsulates":[145],"knowledge":[148],"set":[150],"relationships":[152],"permits":[157],"scientific":[158],"systematic":[160],"reasoning":[161],"about":[162],"security.":[164],"It":[165],"also":[166],"enables":[167],"all":[168,397,686],"user":[169,316,486],"groups":[170,209],"military,":[172],"government,":[173],"industry,":[174],"academia,":[176],"define":[178],"their":[179,345],"requirements":[181,219],"uniform":[184],"manner.":[185],"promises":[189],"development":[191],"\"mixed":[194],"use\"":[195],"class":[196],"future":[201],"that":[202,310,338,367,437,518],"may":[203],"be":[204,471],"simultaneously":[205],"shared":[206],"different":[208],"users,":[211],"system":[214],"sustaining":[215],"diverse":[217],"each":[221],"user.":[222],"A":[223],"characteristic":[225,271],"design":[229,627],"dynamic":[232,353],"call":[233,326,389,394,595,599,648,655],"setup":[234,390,600,649,656],"process.":[235],"Under":[236],"it,":[237],"first":[240],"establishes":[241],"virtual":[243,357,482],"path":[244,483],"or":[245],"route":[246,263],"call,":[250],"guided":[251],"requirements,":[255],"then":[257],"transports":[258],"messages":[260],"when":[261,387],"has":[264,606,628],"been":[265,607,629],"determined.":[267],"integrated":[273],"yield":[278,644],"successful":[280,575],"demonstration":[281],"proposed,":[284],"approach.":[287],"Utilizing":[288,514],"foundation,":[294],"element":[296],"node":[301,360,446,464,475],"link,":[303],"characterized":[305],"matrix":[309],"reflects":[311],"its":[312,478],"resources.":[314],"Every":[315],"permitted":[318],"specify":[320],"requirement":[323],"matrix,":[329],"which":[330],"expresses":[331],"limits":[333],"traffic":[340,517],"cells":[341],"must":[342],"encounter":[343],"during":[344,351],"transport":[346],"network.":[349,501,513],"Thus,":[350],"establishment":[354],"path,":[358],"link":[362],"examined":[364],"ensure":[366],"user-specified":[369],"met,":[372],"addition":[374],"bandwidth":[376],"other":[378],"Quality":[379],"Service":[381],"(QoS)":[382],"requirements.":[383],"Traffic":[384],"launched":[386],"succeeds,":[391],"otherwise,":[392],"fails.":[395],"Like":[396],"inherently":[402],"consists":[403],"geographically":[405],"dispersed":[406,679],"entities":[407],"resource":[413,426,442,497],"allocation":[414],"strategy":[415],"necessarily":[417],"distributed.":[418],"Furthermore,":[419],"operation":[423],"progresses,":[424],"availability":[427],"scene":[428],"changes":[429],"dynamically.":[430],"proposes":[433],"function":[436],"reduces":[438],"key":[440,556],"parameters":[443],"at":[444,462],"single":[449],"value,":[450],"termed":[451],"Node":[452],"Status":[453],"Indicator":[454],"(NSI).":[455],"NSI":[457,492,640],"value":[458],"computed":[460],"dynamically":[461],"disseminated":[466],"across":[467],"utilized":[472],"refine":[477],"determination":[479],"call.":[487],"aim":[489],"improve":[495],"utilization":[498],"modeled":[506],"large-scale,":[509],"representative,":[510],"40-node":[511],"stochastic":[515],"input":[516],"synthesized":[520],"reflect":[522,573],"realistic":[523],"operating":[524],"conditions,":[525],"model":[527],"simulated":[529],"extensively":[530],"on":[531,588],"testbed":[533],"35+":[535],"Pentium":[536],"workstations,":[537],"under":[538],"Linux,":[539],"configured":[540],"loosely-coupled":[543],"parallel":[544],"processor,":[545],"utilizing":[546],"accurate,":[548],"asynchronous,":[549],"distributed":[550],"simulator.":[551],"simulator":[553],"implements":[554],"Forum":[561],"P-NNI":[563],"1.0":[564],"UNI":[566],"3.0":[567],"standards.":[568],"While":[569],"simulation":[571],"results":[572],"realization":[576],"approach,":[580],"analysis":[581,660],"reveals":[582,673],"minimal":[583],"impact":[584],"incorporating":[586],"performance,":[591],"measured":[593],"success":[596],"rates":[597,650],"times.":[601],"tradition":[605],"incorporate":[609],"large-scale":[612],"systems":[613],"afterthought,":[618],"i.e.":[619],"adding":[620],"hardware":[621],"software":[623],"devices":[624],"after":[625],"completed,":[630],"resulting":[631],"performance":[633],"degradation.":[634],"Also,":[635],"while":[636],"use":[638],"observed":[642],"slightly":[645,652],"lower":[646],"average":[647,654],"higher":[653],"times,":[657],"careful":[659],"trace":[663],"calls":[666,677],"progress":[669],"that,":[674],"general,":[676],"throughout":[680],"network,":[682],"seeking":[683],"utilize":[685],"available":[687],"more":[692],"evenly.":[693]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
