.^^•w ^ CoinmuiiiGatio in ATM Networks Daniel Stevenson, Nathan Hillery, and Greg Byrd High-speed networking technolo- gy and standards have pro- gressed dramatically in the past few years and much attention is now focused on deployment efforts, such as the North Carolina Information Highway (NCIH) [7], and applications. With this shift in emphasis, con- cerns have been raised about information security. Examples of abuse of the Internet abound and unfortunately ATM networks are subject to many of these same abuses. This is of substan- tial concern when thinking about extending the reach of public data networking to broad segments of society.