TS 102 165-2 : 4.2.1
Current
The latest, up-to-date edition.
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
3.3 Notation
4 Architecture considerations for security in ICT
4.1 Mapping to 3GPP and NGN architectures
4.2 Use of functions from ISO/IEC 15408
4.3 Requirements model in communications security
5 Authentication counter-measures
5.1 Introduction
5.2 Authentication service requirements
5.3 Overall stage 1 model for authentication
5.4 Specific authentication models (stage 2 models)
6 Access control counter-measures
6.1 Introduction
6.2 Overall stage 1 model for access control
6.3 Specific access control models (stage 2 models)
7 Confidentiality service
7.1 Introduction
7.2 Provided services
7.3 Overall stage 1 model for confidentiality
7.4 Specific confidentiality models (stage 2 models)
8 Integrity service
8.1 Introduction
8.2 Provided services
8.3 Requirements statements for integrity service
functional capabilities (ISO/IEC 15408-2)
8.4 Overall stage 1 model for integrity
8.5 Specific integrity models (stage 2 models)
8.6 Implicit authentication
9 Non-repudiation service
9.1 Overview
9.2 Requirements statements for non-repudiation service
functional capabilities (ISO/IEC 15408-2)
9.3 Overall stage 1 model for non-repudiation
9.4 Specific non-repudiation stage 2 models
10 Subscription Services
11 Authorization services
12 Key management service
12.1 Overview
12.2 Symmetric key management
12.3 Asymmetric key management
Annex A (informative): Modelling techniques in
countermeasure development
A.1 Introduction
A.2 Use of UML patterns
A.3 Use of UML stereotypes
Annex B (informative): Use of IPsec to implement
countermeasures
B.1 Overview
B.2 IPsec architecture
B.3 Key management for IPsec
B.4 IPsec implementation of authentication and integrity
B.5 IPsec implementation of data confidentiality
Annex C (informative): Bibliography
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.