• There are no items in your cart

TS 102 165-2 : 4.2.1

Current
Current

The latest, up-to-date edition.

TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES
Available format(s)

Hardcopy , PDF

Language(s)

English

Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
   3.1 Definitions
   3.2 Abbreviations
   3.3 Notation
4 Architecture considerations for security in ICT
   4.1 Mapping to 3GPP and NGN architectures
   4.2 Use of functions from ISO/IEC 15408
   4.3 Requirements model in communications security
5 Authentication counter-measures
   5.1 Introduction
   5.2 Authentication service requirements
   5.3 Overall stage 1 model for authentication
   5.4 Specific authentication models (stage 2 models)
6 Access control counter-measures
   6.1 Introduction
   6.2 Overall stage 1 model for access control
   6.3 Specific access control models (stage 2 models)
7 Confidentiality service
   7.1 Introduction
   7.2 Provided services
   7.3 Overall stage 1 model for confidentiality
   7.4 Specific confidentiality models (stage 2 models)
8 Integrity service
   8.1 Introduction
   8.2 Provided services
   8.3 Requirements statements for integrity service
        functional capabilities (ISO/IEC 15408-2)
   8.4 Overall stage 1 model for integrity
   8.5 Specific integrity models (stage 2 models)
   8.6 Implicit authentication
9 Non-repudiation service
   9.1 Overview
   9.2 Requirements statements for non-repudiation service
        functional capabilities (ISO/IEC 15408-2)
   9.3 Overall stage 1 model for non-repudiation
   9.4 Specific non-repudiation stage 2 models
10 Subscription Services
11 Authorization services
12 Key management service
   12.1 Overview
   12.2 Symmetric key management
   12.3 Asymmetric key management
Annex A (informative): Modelling techniques in
        countermeasure development
      A.1 Introduction
      A.2 Use of UML patterns
      A.3 Use of UML stereotypes
Annex B (informative): Use of IPsec to implement
        countermeasures
      B.1 Overview
      B.2 IPsec architecture
      B.3 Key management for IPsec
      B.4 IPsec implementation of authentication and integrity
      B.5 IPsec implementation of data confidentiality
Annex C (informative): Bibliography
History

Describes by means of an information model and functional entity behavioural model, the security countermeasures for the ICT in general.

Committee
TISPAN 07
DocumentType
Standard
Pages
51
PublisherName
European Telecommunications Standards Institute
Status
Current

TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
TR 181 004 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN GENERIC CAPABILITIES AND THEIR USE TO DEVELOP SERVICES
EG 202 549 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES
EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
TR 102 420 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY
SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
TR 101 878 : 5.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 5; SERVICE CAPABILITY DEFINITION; SERVICE CAPABILITIES FOR A MULTI MEDIA CALL
TS 187 016 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE)
TS 102 285 : 1.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); TIPHON/UMTS HARMONIZATION: GENERAL ASPECTS
TS 102 556 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE
TS 187 003 : 3.4.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; SECURITY ARCHITECTURE

ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
TS 133 210 : 13.0.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; NETWORK DOMAIN SECURITY (NDS); IP NETWORK LAYER SECURITY (3GPP TS 33.210 VERSION 14.0.0 RELEASE 14)
TR 133 978 : 8.0.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; SECURITY ASPECTS OF EARLY IP MULTIMEDIA SUBSYSTEM (IMS)
TS 187 001 : 3.9.1 NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS
TR 187 002 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
ISO/IEC 9798-4:1999 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
TS 187 003 : 3.4.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; SECURITY ARCHITECTURE
ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
ISO/IEC 17799:2005 Information technology Security techniques Code of practice for information security management
ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework
EN 300 392-7 : 3.3.1 TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY
TS 101 882-2 : 4.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; PROTOCOL FRAMEWORK DEFINITION; PART 2: REGISTRATION AND SERVICE ATTACHMENT SERVICE META-PROTOCOL DEFINITION
ISO/IEC 13335-1:2004 Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
TS 101 303 : 4.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; SERVICE AND NETWORK MANAGEMENT FRAMEWORK; OVERVIEW AND INTRODUCTION

View more information
US$47.91
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.