BSI PD ISO/IEC TR 29181-5:2014
$102.76
Information technology. Future Network. Problem statement and requirements – Security
Published By | Publication Date | Number of Pages |
BSI | 2014 | 16 |
This part of ISO/IEC TR 29181 describes the problem statements of current network and the requirements for Future Network in the security perspective. This part of ISO/IEC TR 29181 mainly specifies
-
problems of the current network in security environment, and
-
requirements for security support in Future Network.
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | Foreword |
7 | Introduction |
8 | 1 Scope 2 Terms and definitions 3 Abbreviations |
9 | 4 General 4.1 Security environment in FN 4.2 Related works on security in FN 5 Problem statement of current network in security environment 5.1 The existing problems and reasons of network security |
10 | 5.1.1 Network users undertake the security risk and responsibilities 5.1.2 Irregular Address and no truly proof for origin 5.1.3 Central control may lead to security disaster 5.2 The current network security protection measures and effect 5.2.1 Current security protection means of common network user |
11 | 5.2.2 Current security protection means of professional users 5.3 Disadvantages of existing network security defense system 6 The goal and requirements of FN security 6.1 The goal of FN security |
12 | 6.2 The requirements of FN security 6.2.1 From passive defense to active management 6.2.2 Replace computing confrontation with authentication technology 6.2.3 Forming one to more system solution with authentication technology 6.3 FN security technical system 6.3.1 Identity Authentication system 6.3.2 Platform security (Trusted Computing) 6.3.3 Secure connection and transmission 6.3.4 Application security 6.3.5 The functional requirements of FN security system |
13 | 7 Consideration of Key technology for FN security implementation 7.1 Support the real-name and anonymity authentication 7.2 Support large-scale application 7.3 Support end-to-end directly authentication and key exchange 7.4 Support management domain segmentation and cross-domain authentication 7.5 Simple structure, convenient use, low cost, and easy popularized 7.6 The application method to realize Identity Authentication |