ETSI TS 102 165-2 V4.2.1 (2007-02)
Current
The latest, up-to-date edition.
Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 2: Protocol Framework Definition; Security Counter Measures
Hardcopy , PDF
English
01-02-2007
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
3.3 Notation
4 Architecture considerations for security in ICT
4.1 Mapping to 3GPP and NGN architectures
4.2 Use of functions from ISO/IEC 15408
4.3 Requirements model in communications security
5 Authentication counter-measures
5.1 Introduction
5.2 Authentication service requirements
5.3 Overall stage 1 model for authentication
5.4 Specific authentication models (stage 2 models)
6 Access control counter-measures
6.1 Introduction
6.2 Overall stage 1 model for access control
6.3 Specific access control models (stage 2 models)
7 Confidentiality service
7.1 Introduction
7.2 Provided services
7.3 Overall stage 1 model for confidentiality
7.4 Specific confidentiality models (stage 2 models)
8 Integrity service
8.1 Introduction
8.2 Provided services
8.3 Requirements statements for integrity service
functional capabilities (ISO/IEC 15408-2)
8.4 Overall stage 1 model for integrity
8.5 Specific integrity models (stage 2 models)
8.6 Implicit authentication
9 Non-repudiation service
9.1 Overview
9.2 Requirements statements for non-repudiation service
functional capabilities (ISO/IEC 15408-2)
9.3 Overall stage 1 model for non-repudiation
9.4 Specific non-repudiation stage 2 models
10 Subscription Services
11 Authorization services
12 Key management service
12.1 Overview
12.2 Symmetric key management
12.3 Asymmetric key management
Annex A (informative): Modelling techniques in
countermeasure development
A.1 Introduction
A.2 Use of UML patterns
A.3 Use of UML stereotypes
Annex B (informative): Use of IPsec to implement
countermeasures
B.1 Overview
B.2 IPsec architecture
B.3 Key management for IPsec
B.4 IPsec implementation of authentication and integrity
B.5 IPsec implementation of data confidentiality
Annex C (informative): Bibliography
History
Describes by means of an information model and functional entity behavioural model, the security countermeasures for the ICT in general.
| DocumentType |
Technical Specification
|
| Pages |
51
|
| PublisherName |
European Telecommunications Standards Institute
|
| Status |
Current
|
| ETSI TS 102 165-1 V4.2.3 (2011-03) | Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis |
| ISO/IEC 9798-3:1998 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques |
| ETSI TS 102 165-1 V4.2.3 (2011-03) | Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis |
| ISO/IEC 9798-4:1999 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function |
| ISO/IEC 10181-3:1996 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Access control framework |
| ISO/IEC 9798-2:2008 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms |
| ISO/IEC 10181-4:1997 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Non-repudiation framework — Part 4: |
| ISO/IEC 10181-2:1996 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Authentication framework |
| ISO/IEC 17799:2005 | Information technology — Security techniques — Code of practice for information security management |
| ISO/IEC 10181-6:1996 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Integrity framework |
| ISO/IEC 13335-1:2004 | Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security management |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.