TS 102 165-2 : 4.2.1
Current
The latest, up-to-date edition.
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
3.3 Notation
4 Architecture considerations for security in ICT
4.1 Mapping to 3GPP and NGN architectures
4.2 Use of functions from ISO/IEC 15408
4.3 Requirements model in communications security
5 Authentication counter-measures
5.1 Introduction
5.2 Authentication service requirements
5.3 Overall stage 1 model for authentication
5.4 Specific authentication models (stage 2 models)
6 Access control counter-measures
6.1 Introduction
6.2 Overall stage 1 model for access control
6.3 Specific access control models (stage 2 models)
7 Confidentiality service
7.1 Introduction
7.2 Provided services
7.3 Overall stage 1 model for confidentiality
7.4 Specific confidentiality models (stage 2 models)
8 Integrity service
8.1 Introduction
8.2 Provided services
8.3 Requirements statements for integrity service
functional capabilities (ISO/IEC 15408-2)
8.4 Overall stage 1 model for integrity
8.5 Specific integrity models (stage 2 models)
8.6 Implicit authentication
9 Non-repudiation service
9.1 Overview
9.2 Requirements statements for non-repudiation service
functional capabilities (ISO/IEC 15408-2)
9.3 Overall stage 1 model for non-repudiation
9.4 Specific non-repudiation stage 2 models
10 Subscription Services
11 Authorization services
12 Key management service
12.1 Overview
12.2 Symmetric key management
12.3 Asymmetric key management
Annex A (informative): Modelling techniques in
countermeasure development
A.1 Introduction
A.2 Use of UML patterns
A.3 Use of UML stereotypes
Annex B (informative): Use of IPsec to implement
countermeasures
B.1 Overview
B.2 IPsec architecture
B.3 Key management for IPsec
B.4 IPsec implementation of authentication and integrity
B.5 IPsec implementation of data confidentiality
Annex C (informative): Bibliography
History
Describes by means of an information model and functional entity behavioural model, the security countermeasures for the ICT in general.
Committee |
TISPAN 07
|
DocumentType |
Standard
|
Pages |
51
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
TR 102 780 : 1.1.1 | METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
TR 181 004 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN GENERIC CAPABILITIES AND THEIR USE TO DEVELOP SERVICES |
EG 202 549 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES |
EG 202 387 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES |
TR 102 420 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY |
SR 002 564 : 2.0.0 | APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH |
TS 102 165-1 : 4.2.3 | CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
TR 101 878 : 5.1.1 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 5; SERVICE CAPABILITY DEFINITION; SERVICE CAPABILITIES FOR A MULTI MEDIA CALL |
TS 187 016 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE) |
TS 102 285 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); TIPHON/UMTS HARMONIZATION: GENERAL ASPECTS |
TS 102 556 : 1.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE |
TS 187 003 : 3.4.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; SECURITY ARCHITECTURE |
ISO/IEC 9798-3:1998 | Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
TS 133 210 : 13.0.0 | DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; NETWORK DOMAIN SECURITY (NDS); IP NETWORK LAYER SECURITY (3GPP TS 33.210 VERSION 14.0.0 RELEASE 14) |
TR 133 978 : 8.0.0 | UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; SECURITY ASPECTS OF EARLY IP MULTIMEDIA SUBSYSTEM (IMS) |
TS 187 001 : 3.9.1 | NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS |
TR 187 002 : 3.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS |
TS 102 165-1 : 4.2.3 | CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
ISO/IEC 9798-4:1999 | Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function |
ISO/IEC 10181-3:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
TS 187 003 : 3.4.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; SECURITY ARCHITECTURE |
ISO/IEC 10181-4:1997 | Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4: |
ISO/IEC 10181-2:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management |
ISO/IEC 10181-6:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework |
EN 300 392-7 : 3.3.1 | TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY |
TS 101 882-2 : 4.1.1 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; PROTOCOL FRAMEWORK DEFINITION; PART 2: REGISTRATION AND SERVICE ATTACHMENT SERVICE META-PROTOCOL DEFINITION |
ISO/IEC 13335-1:2004 | Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management |
TS 101 303 : 4.1.1 | TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; SERVICE AND NETWORK MANAGEMENT FRAMEWORK; OVERVIEW AND INTRODUCTION |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.