Skip to main content

Security requirements of the TMN X-interface within end-to-end service management of virtual private networks

  • Conference paper
  • First Online:
Towards a Pan-European Telecommunication Service Infrastructure — IS&N '94 (IS&N 1994)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 851))

Included in the following conference series:

  • 135 Accesses

Abstract

This paper1 examines the issue of providing security for the exchange of VPN management data over the TMN X-interface. In particular it introduces the concept of what security is in this context and examines the security requirements of this interface. The aim is to aid the designers of TMN security systems which are necessary in the future. Finally an overview of the current status of the ISO security related standards work and the extent to which it meets the identified requirements is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. Donnelly and M. Tschichholz The PREPARE Management Information Service VPN Inter-Domain Management using an Integrated X.500 and X.700 Information Model Proceedings of the RACE IS&N Conference, Paris, (1993).

    Google Scholar 

  2. IBC Common Functional Specification TMN Security Architecture Specification RACE H210, December (1993).

    Google Scholar 

  3. Common Functional Specification Security of Service Management Specification RACE H211, January, (1994).

    Google Scholar 

  4. D. Lewis and W. Donnelly Managing Broadband VPN Services in the PREPARE Testbed Proceedings of the RACE IS&N Conference, Paris, (1993).

    Google Scholar 

  5. S. O'Connell and A. Patel Provision of Network Security in a Health Care Environment Israel, MIE' 93.

    Google Scholar 

  6. Communications Standards — Part 1 — ISO Document List, OMICOM PPI Ltd., March, (1993).

    Google Scholar 

  7. S. L. Pfleeger: A Framework for Security Requirements Computers & Security, Volume 10, pp. 515–523, (1991).

    Google Scholar 

  8. S. Plagemann Impact of Open Network Provisioning (ONP) on TMN Proceedings of the RACE IS&N Conference, Paris, (1993).

    Google Scholar 

  9. J. M. Schneider and W. Donnelly An Open Architecture for Inter-Domain Communications Management in the PREPARE Testbed. Broadband Islands Conference Proceedings, Athens, (1993).

    Google Scholar 

  10. J. Wack and L. Carnahan Computer Viruses and Related Threat — A Management Guide NIST Special Publication, 500–166.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hans-Jürgen Kugler Al Mullery Norbert Niebert

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

O'Connell, S., Donnelly, W. (1994). Security requirements of the TMN X-interface within end-to-end service management of virtual private networks. In: Kugler, HJ., Mullery, A., Niebert, N. (eds) Towards a Pan-European Telecommunication Service Infrastructure — IS&N '94. IS&N 1994. Lecture Notes in Computer Science, vol 851. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013413

Download citation

  • DOI: https://doi.org/10.1007/BFb0013413

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-58420-9

  • Online ISBN: 978-3-540-48784-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics