Shopping Cart

No products in the cart.

BSI PD ISO/IEC TR 29181-5:2014

$102.76

Information technology. Future Network. Problem statement and requirements – Security

Published By Publication Date Number of Pages
BSI 2014 16
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of ISO/IEC TR 29181 describes the problem statements of current network and the requirements for Future Network in the security perspective. This part of ISO/IEC TR 29181 mainly specifies

  • problems of the current network in security environment, and

  • requirements for security support in Future Network.

PDF Catalog

PDF Pages PDF Title
6 Foreword
7 Introduction
8 1 Scope
2 Terms and definitions
3 Abbreviations
9 4 General
4.1 Security environment in FN
4.2 Related works on security in FN
5 Problem statement of current network in security environment
5.1 The existing problems and reasons of network security
10 5.1.1 Network users undertake the security risk and responsibilities
5.1.2 Irregular Address and no truly proof for origin
5.1.3 Central control may lead to security disaster
5.2 The current network security protection measures and effect
5.2.1 Current security protection means of common network user
11 5.2.2 Current security protection means of professional users
5.3 Disadvantages of existing network security defense system
6 The goal and requirements of FN security
6.1 The goal of FN security
12 6.2 The requirements of FN security
6.2.1 From passive defense to active management
6.2.2 Replace computing confrontation with authentication technology
6.2.3 Forming one to more system solution with authentication technology
6.3 FN security technical system
6.3.1 Identity Authentication system
6.3.2 Platform security (Trusted Computing)
6.3.3 Secure connection and transmission
6.3.4 Application security
6.3.5 The functional requirements of FN security system
13 7 Consideration of Key technology for FN security implementation
7.1 Support the real-name and anonymity authentication
7.2 Support large-scale application
7.3 Support end-to-end directly authentication and key exchange
7.4 Support management domain segmentation and cross-domain authentication
7.5 Simple structure, convenient use, low cost, and easy popularized
7.6 The application method to realize Identity Authentication
BSI PD ISO/IEC TR 29181-5:2014
$102.76