Security requirements of the TMN X-interface within end-to-end service management of virtual private networks

  • S. O'Connell
  • W. Donnelly
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 851)


This paper1 examines the issue of providing security for the exchange of VPN management data over the TMN X-interface. In particular it introduces the concept of what security is in this context and examines the security requirements of this interface. The aim is to aid the designers of TMN security systems which are necessary in the future. Finally an overview of the current status of the ISO security related standards work and the extent to which it meets the identified requirements is presented.


Security threats TMN X-interface VPN management 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


    W. Donnelly and M. Tschichholz The PREPARE Management Information Service VPN Inter-Domain Management using an Integrated X.500 and X.700 Information Model Proceedings of the RACE IS&N Conference, Paris, (1993).Google Scholar
  2. [H210]
    IBC Common Functional Specification TMN Security Architecture Specification RACE H210, December (1993).Google Scholar
  3. [H211]
    Common Functional Specification Security of Service Management Specification RACE H211, January, (1994).Google Scholar
  4. [LEWIS]
    D. Lewis and W. Donnelly Managing Broadband VPN Services in the PREPARE Testbed Proceedings of the RACE IS&N Conference, Paris, (1993).Google Scholar
    S. O'Connell and A. Patel Provision of Network Security in a Health Care Environment Israel, MIE' 93.Google Scholar
  6. [OMICOM]
    Communications Standards — Part 1 — ISO Document List, OMICOM PPI Ltd., March, (1993).Google Scholar
    S. L. Pfleeger: A Framework for Security Requirements Computers & Security, Volume 10, pp. 515–523, (1991).Google Scholar
    S. Plagemann Impact of Open Network Provisioning (ONP) on TMN Proceedings of the RACE IS&N Conference, Paris, (1993).Google Scholar
    J. M. Schneider and W. Donnelly An Open Architecture for Inter-Domain Communications Management in the PREPARE Testbed. Broadband Islands Conference Proceedings, Athens, (1993).Google Scholar
  10. [WACK]
    J. Wack and L. Carnahan Computer Viruses and Related Threat — A Management Guide NIST Special Publication, 500–166.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  • S. O'Connell
    • 1
  • W. Donnelly
    • 1
  1. 1.Broadcom Eireann ResearchDublin 2

Personalised recommendations