• Shopping Cart
    There are no items in your cart

ETSI TS 102 165-2 V4.2.1 (2007-02)

Current

Current

The latest, up-to-date edition.

Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 2: Protocol Framework Definition; Security Counter Measures

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-02-2007

Free

Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
   3.1 Definitions
   3.2 Abbreviations
   3.3 Notation
4 Architecture considerations for security in ICT
   4.1 Mapping to 3GPP and NGN architectures
   4.2 Use of functions from ISO/IEC 15408
   4.3 Requirements model in communications security
5 Authentication counter-measures
   5.1 Introduction
   5.2 Authentication service requirements
   5.3 Overall stage 1 model for authentication
   5.4 Specific authentication models (stage 2 models)
6 Access control counter-measures
   6.1 Introduction
   6.2 Overall stage 1 model for access control
   6.3 Specific access control models (stage 2 models)
7 Confidentiality service
   7.1 Introduction
   7.2 Provided services
   7.3 Overall stage 1 model for confidentiality
   7.4 Specific confidentiality models (stage 2 models)
8 Integrity service
   8.1 Introduction
   8.2 Provided services
   8.3 Requirements statements for integrity service
        functional capabilities (ISO/IEC 15408-2)
   8.4 Overall stage 1 model for integrity
   8.5 Specific integrity models (stage 2 models)
   8.6 Implicit authentication
9 Non-repudiation service
   9.1 Overview
   9.2 Requirements statements for non-repudiation service
        functional capabilities (ISO/IEC 15408-2)
   9.3 Overall stage 1 model for non-repudiation
   9.4 Specific non-repudiation stage 2 models
10 Subscription Services
11 Authorization services
12 Key management service
   12.1 Overview
   12.2 Symmetric key management
   12.3 Asymmetric key management
Annex A (informative): Modelling techniques in
        countermeasure development
      A.1 Introduction
      A.2 Use of UML patterns
      A.3 Use of UML stereotypes
Annex B (informative): Use of IPsec to implement
        countermeasures
      B.1 Overview
      B.2 IPsec architecture
      B.3 Key management for IPsec
      B.4 IPsec implementation of authentication and integrity
      B.5 IPsec implementation of data confidentiality
Annex C (informative): Bibliography
History

Describes by means of an information model and functional entity behavioural model, the security countermeasures for the ICT in general.

DocumentType
Technical Specification
Pages
51
PublisherName
European Telecommunications Standards Institute
Status
Current

ETSI TS 102 165-1 V4.2.3 (2011-03) Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis

ISO/IEC 9798-3:1998 Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques
ETSI TS 102 165-1 V4.2.3 (2011-03) Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis
ISO/IEC 9798-4:1999 Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function
ISO/IEC 10181-3:1996 Information technology — Open Systems Interconnection — Security frameworks for open systems: Access control framework
ISO/IEC 9798-2:2008 Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms
ISO/IEC 10181-4:1997 Information technology — Open Systems Interconnection — Security frameworks for open systems: Non-repudiation framework — Part 4:
ISO/IEC 10181-2:1996 Information technology — Open Systems Interconnection — Security frameworks for open systems: Authentication framework
ISO/IEC 17799:2005 Information technology — Security techniques — Code of practice for information security management
ISO/IEC 10181-6:1996 Information technology — Open Systems Interconnection — Security frameworks for open systems: Integrity framework
ISO/IEC 13335-1:2004 Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security management

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Free