Skip to main content

A TTP-based architecture for TMN security and privacy

  • Conference paper
  • First Online:
  • 136 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 998))

Abstract

It has been recently stressed [1] that the rapid development of new telecommunication services could be undermined by the lack of commercial security for the service providers and the lack of privacy for their users. Security solutions to cater for those needs will almost necessarily employ encryption techniques which are still, and perhaps more and more, subject to severe control by government authorities with respect to the protection of the public order and the national security. Security architectures which might satisfy those apparently conflicting requirements have to be proposed. Another aspect is that those security architectures should permit both the security of the telecommunications services and the security of their management services, given that the final users will more and more have access to those management services. The objective of this contribution is to show how a security architecture based on Trusted Third Parties can bring an answer to the above problem, and what would be the consequences of using TTP services to secure management systems, in particular, the implications on the specification of TMN interfaces. This work was carried out in the framework of the RACE project 2041 PRISM.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Recommendations to the European Council, Europe and the global information society, “The Bangemann Report”, 26 May 1994

    Google Scholar 

  2. IBAG Statement on the Availability of Commercial Cryptography, March 94

    Google Scholar 

  3. CEC: Green Book on the Security of Information Systems. Draft 3.6 (July 14. 1993)

    Google Scholar 

  4. CEC: “On the Establishment of the Internal Market for Telecommunications Services through the Implementation of Open Network Provision (ONP Directive)”, Council Directive DIR(90) 387 ECC (1990)

    Google Scholar 

  5. NERA and MITA: “Study of the Application of ONP to Network Management”, report prepared for CEC DG XIII (1992)

    Google Scholar 

  6. ICC Position Paper on International Encryption Policy, International Chamber of Commerce, 1994

    Google Scholar 

  7. ETSI: “Requirements Specification for an Encryption Algorithm for Operators of European Public Telecommunications Networks”. ETSI TC-TR NA/STAG 5 (93) 123 rev. 4 (1993)

    Google Scholar 

  8. CEC: “Amended Proposal for a Council Directive on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data”, Commission communication to the Council COM(92) 422 final (1992)

    Google Scholar 

  9. CEC: “Proposal for a Council Directive Concerning the Protection of Personal Data and Privacy in the Context of Public Digital Telecommunications Networks, in Particular the Integrated Services Digital Networks (ISDN) and Public Digital Mobile Networks”, Commission communication to the Council COM(90) (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Anne Clarke Mario Campolargo Nikos Karatzas

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maillot, D., Ølnes, J., Spilling, P. (1995). A TTP-based architecture for TMN security and privacy. In: Clarke, A., Campolargo, M., Karatzas, N. (eds) Bringing Telecommunication Services to the People — IS&N '95. IS&N 1995. Lecture Notes in Computer Science, vol 998. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0016956

Download citation

  • DOI: https://doi.org/10.1007/BFb0016956

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60479-2

  • Online ISBN: 978-3-540-47618-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics