ATIS 1000007-2006 Generic Signaling and Control Plane Security Requirements for Evolving Networks.pdf
《ATIS 1000007-2006 Generic Signaling and Control Plane Security Requirements for Evolving Networks.pdf》由会员分享,可在线阅读,更多相关《ATIS 1000007-2006 Generic Signaling and Control Plane Security Requirements for Evolving Networks.pdf(38页珍藏版)》请在麦多课文档分享上搜索。
1、 AMERICAN NATIONAL STANDARD FOR TELECOMMUNICATIONS ATIS-1000007.2006(R2011) Generic Signaling and Control Plane Security Requirements for Evolving Networks ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standa
2、rds for the information, entertainment and communications industry. More than 250 companies actively formulate standards in ATIS 18 Committees, covering issues including: IPTV, Service Oriented Networks, Energy Efficiency, IP-Based and Wireless Technologies, Quality of Service, and Billing and Opera
3、tional Support. In addition, numerous Incubators, Focus and Exploratory Groups address emerging industry priorities including “Green”, IP Downloadable Security, Next Generation Carrier Interconnect, IPv6 and Convergence. ATIS is the North American Organizational Partner for the 3rd Generation Partne
4、rship Project (3GPP), a member and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunications Sectors, and a member of the Inter-American Telecommunication Commission (CITEL). For more information, please visit . AMERICAN NATIONAL STANDARD Approval of an A
5、merican National Standard requires review by ANSI that the requirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached b
6、y directly and materially affected interests. Substantial agreement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made towards their resolution. The use of American National Standa
7、rds is completely voluntary; their existence does not in any respect preclude anyone, whether he has approved the standards or not, from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. The American National Standards Institute does n
8、ot develop standards and will in no circumstances give an interpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests for interpr
9、etations should be addressed to the secretariat or sponsor whose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be taken periodic
10、ally to reaffirm, revise, or withdraw this standard. Purchasers of American National Standards may receive current information on all standards by calling or writing the American National Standards Institute. Notice of Disclaimer http:/www.ietf.org/rfc/rfc2401.txt?number=2401RFC 2406 IETF RFC 2406,
11、IP Encapsulating Security Payload (ESP), http:/www.ietf.org/rfc/rfc2406.txt?number=2406RFC 2410 IETF RFC 2410, The Null Encryption Algorithm and Its Use with IPsec, http:/www.ietf.org/rfc/rfc2410.txt?number=2410RFC 2451 IETF RFC 2451, The ESP CBC-Mode Cipher Algorithms, http:/www.ietf.org/rfc/rfc245
12、1.txtRFC 3602 IETF RFC 3602, The AES-CBC Cipher Algorithm and Its Use with IPsec, http:/www.ietf.org/internet-drafts/draft-ietf-ipsec-ciph-aes-cbc-04.txtRFC 2404 IETF RFC 2404, The Use of HMAC-SHA-1-96 within ESP and AH, http:/www.ietf.org/rfc/rfc2404.txt?number=2404RFC 3566 IETF RFC 3566, The AES-X
13、CBC-MAC-96 Algorithm and Its Use With IPsec, http:/www.ietf.org/rfc/rfc3566.txt?number=3566RFC 2409 IETF RFC 2409, Internet Key Exchange, http:/www.ietf.org/rfc/rfc2409.txt?number=2409RFC 3526 IETF RFC 3526, More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE). http:
14、/www.ietf.org/rfc/rfc2409.txt?number=2409RFC 2246 IETF RFC 2246, The TLS Protocol, Version 1.0, ftp:/ftp.rfc-editor.org/in-notes/rfc2246.txtRFC 3268 IETF RFC 3268, Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) http:/www.ietf.org/rfc/rfc3268.txt?number=3268RFC 354
15、6 IETF RFC 3546, Transport Layer Security (TLS) Extensions, ftp:/ftp.rfc-editor.org/in-notes/rfc3546.txt3DES Federal Information Processing Standards (FIPS) Publication 46-3, Data Encryption Standard, National Institute of Standards and Technology, October 1999. http:/csrc.nist.gov/publications/fips
16、/ fips46-3/fips46-3.pdfFIPS-197 FIPS Publication 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology, November 2001. http:/csrc.nist.gov/publications/fips/fips197/fips-197.pdfFIPS-180-2 FIPS Publication 180-2, Secure Hash Standard, National Institute of Standards
17、and Technology. http:/csrc.nist.gov/publications/fips/fips180-2/fips180-2withchangenotice.pdfRFC 1321 IETF RFC 1321, The MD5 Message-Digest Algorithm, http:/www.ietf.org/rfc/rfc2409.txt?number=2409ITU X.800 ITU-T Recommendation X.800, Security architecture for Open Systems Interconnection for CCITT
18、applications. ITU X.805 ITU-T Recommendation X.805, Security architecture for systems providing end-to-end communications. 3 DEFINITIONS The following definitions apply: 3.1 Access Control - The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unautho
19、rized manner. 3.2 Access Control List - A list of entities, together with their access rights, which are authorized to have access to a resource. 3.3 Access Control Policy - The set of rules that define the conditions under which access to a particular resource may take place. ATIS-1000007.2006 4 3.
20、4 Asymmetric Cryptographic Algorithm - An algorithm for performing encryption or the corresponding decryption where the keys used for encryption and decryption differ. 3.5 Authentication - The process of verifying the claimed identity of an entity to another entity or corroboration that the source o
21、f data received is as claimed. NOTE - The authenticated entity may belong either to the Application Security Layer or to the Network Services Security Layer of the Security Architectural Model. In general cases, authentication at one layer does not follow from authentication at the other layer. Auth
22、entication spans peer entity and data origin authentication where only data origin authentication provides an integrity mechanism. 3.6 Authorization - The act of giving access rights to a service, device, or resource by an entity with authority to grant this permission. 3.7 Availability - The proper
23、ty of being accessible and useable upon demand by an authorized entity. 3.8 Certificate - A set of security-relevant data issued by a security authority or trusted third party, together with security information which is used to provide the integrity and data origin authentication services for the d
24、ata. The security information includes subject attributes and an indication of a time period of validity. 3.9 Communication party - The participator or process communicating with another counterpart(s) at the Application Security Layer of the Security Architectural Model by means of application laye
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS10000072006GENERICSIGNALINGANDCONTROLPLANESECURITYREQUIREMENTSFOREVOLVINGNETWORKSPDF

链接地址:http://www.mydoc123.com/p-541419.html