CEPT T SF 56 E-1987 Services and Facilities for Information Security in Visual Telematic Services《可视电传业务中信息安全服务和设备》.pdf
《CEPT T SF 56 E-1987 Services and Facilities for Information Security in Visual Telematic Services《可视电传业务中信息安全服务和设备》.pdf》由会员分享,可在线阅读,更多相关《CEPT T SF 56 E-1987 Services and Facilities for Information Security in Visual Telematic Services《可视电传业务中信息安全服务和设备》.pdf(8页珍藏版)》请在麦多课文档分享上搜索。
1、T/SF 56 E Page 1 Recornmendation T/SF 56 (Copenhagen 1987) SERVICES AND FACILITIES FOR INFORMATION SECURITY IN VISUAL TELEMATTC SERVICES Recommendation proposed by Working Group T/WG 7 “Services and facilities” (SF) Text of the Recommendation ndopted by “Telecommunicatioits” Commission ; “The Europe
2、an Conference of Posts and Telecommunications Administrations, considering 1. several teleconferencing services are being harmonised by CEPT, in which real-time, or quasi-real-time visual telematic services are provided between two or more terminals, 2. visual telematic services are a useful alterna
3、tive to face-to-face meetings, but that business customers will be reluctant to use the service unless confidentiality can be assured, 3. revenue potential will be maximised if the level of security of visual telematic services is perceived to be acceptable to customers of the Administrations, 4. se
4、rvices and facilities for information security in visual telematic services may be provided in several different ways, according both to local circumstance, and to the organisation of the networks that support the service, 5. visual telematic services conforming to the CEPT Recommendation for securi
5、ty may have an operational requirement to intenvork with non-conforming terminals, or with terminals operated by Administrations outside CEPT, 6. information condentiality and key-management comprise the set of security supplementary services that have the greatest economic justification in visual t
6、elematic services, 7. the options for information confidentiality currently being considered by CEPT Administrations, and available to CEPT technical groups (as notified on 1987-05-06) are: The American Data Encryption Standard; The GRETAG psivacy system and the B-CRYPT system, 8. the options for ke
7、y-management available to CEPT technical groups are: Manual exchange of secret key; Bilateral master key protocols; Stand-alone number-theoretic systems; and a visual services derivative of CCITT X.ds7 Public directory number-theoretic key-management system, O recommends that 1. the following guide
8、is adopted for the further detailed study of the optional information security supplementary services for visual telematic services, 2. three network service security options have currently been identified, which can be used by Administrations at their discretion, in which: 2.1. for a minimum cost s
9、olution, the security supplementary services may be implemented between the network nodes supporting the visual telematic services so as to provide protection to those parts of the route of the bearer network that are most exposed to monitoring or attack, 2.2. at a higher cost than 2.1., the securit
10、y supplementary services may be provided on an end-to-end basis, thus protecting the local network part of the visual telematic service route, as well as the inter-nodal network, 2.3. in order to provide a harmonised procedure for dealing with non-conforming terminals, an interworking capability may
11、 provide facilities for secure visual telematic services by means of a relay node or gateway, offering conversion facilities for visual telematic services deploying differing security parameters, O Edition of January 15, 1988 T/SF 56 E Page 2 _I- CEPT T/SF*Sb*E 87 - 2326414 0009451 O - 3. there shou
12、ld be compatibility between terminals of the visual telematic services that have invoked the same set 4. direct inter-communication should be possible between terminals arranged in different network security topologies 5. the method/system of information confidentiality should ensure that for visual
13、 telematic services: of security supplementary services, of clause 2. of this Recommendation, 51, the method/system is available to customers of all CEPT Administrations without restriction, and should be 5.2. the cost is reasonable compared to the functionality offered, 6. subject to bilateral agre
14、ement between the Administrations participating in the visual telematic service, any other arrangement may be used for confidentiality and interworking with terminals conforming to the CEPT Recom- mendations for confidentiality effected by means of the conversion facility described in clause 2.3. of
15、 this Recommendation, 7. manual exchange of secret keys is adopted, pending Recommendations from CCITT on systems that can be used for key-management .” multi-sourced, Edition of January 15, 1988 CEPT T/SF*5b*E 87 2326414 OOOLl52 2 W _ 1. 2. e 2.1. 2.2. 2.3. T/SF 56 E Page 3 Annex THE VISUAL TELEMAT
16、IC SERVICES MARKET Several teleconferencing services are being harmonised by CEPT in which real-time, or quasi-real-time visual services, sometimes accompanied by speech, text or graphic services, are provided between two or more terminals by means of high-speed bearer services. Market surveys in se
17、veral countries indicate that these visual telematic services are a useful alternative to face-to-face meetings, but that business customers are reluctant to use the service unless confidentiality can be assured to a level commensurate with commercial practice. Therefore CEPT is recommending a reper
18、toire of supplementary services for information security in visual telematic services that are appropriate and acceptable to its Administrations for protecting inter-European visual telematic services. The Security of other telematic services that may be used in conjunction with visual services, for
19、 example, speech (if not part of the implementation of the visual telematic service), Teletex and graphic services, facsimile and telewriting, are addressed in separate CEPT-SF Recommendations for the security of each individual telematic service. NETWORK SECURE SERVICE OPTIONS The services and faci
20、lities for information security in visual telematic services may be provided in several different ways according to the organisation of the networks that support the service. The choice of security options, as represented by the network secure service options described in 2.1. to 2.3., will be deter
21、mined by each Administration taking cognisance of local circumstance, the compromise between the requirements of the customer, the threats to the network and the cost of the various options. However, regardless of which nehvork security topology is chosen, the security framework for international vi
22、sual telematic services should enable: (a) complete compatibility behveen terminals of the visual telematic services terminals that have invoked (b) the ability to intercommunicate directly between terminals arranged in different network security the same set of security supplementary services, topo
23、logies. Inter-nodal protection For a minimum cost solution, the security supplementary services may be implemented between the network nodes supporting the visual telematic services so as to provide protection only on those parts of the route of the bearer network that are most exposed to monitoring
24、 or attack, e.g. : satellite and terrestrial radio links (see Figure 1 (T/SF 56). The location of the security supplementary services at a network node enables the Administration to dimension the security functionality on a shared basis at strategic network switching centres, thus reducing considera
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CEPTTSF56E1987SERVICESANDFACILITIESFORINFORMATIONSECURITYINVISUALTELEMATICSERVICES 可视 电传 业务 信息 安全 服务

链接地址:http://www.mydoc123.com/p-593325.html