Skip to main content

Design of EDI security MIB based on SNMP protocol

  • Session B-4: Interculture Technology
  • Conference paper
  • First Online:
Worldwide Computing and Its Applications — WWCA'98 (WWCA 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1368))

Included in the following conference series:

  • 117 Accesses

Abstract

This paper considers the design and management of security MIB for EDI system. EDI system has to establish security services and mechanisms such as authentication, secure access management, confidentiality, integrity, non-repudiation, message security labeling and security management to protect against security threats. Hence, the EDI system requires appropriate security management to monitor and control the security objects for its security services and mechanisms. In this paper, I identify security management objects for security services defined in the EDI system, and propose the design of a security MIB and describe the use of SNMPv2 network management protocol in its management.

This research was supported by KOSEF while the author was visiting at Department of Computing, University of Western Sydney, Nepean, Australia.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. T. K. Apostolopoulos, V.C. Daskalou: SNMP-based Network Security Management using a Temporal Database Approach Information Systems Security edited by S.K.Katsikas, and D.Gritzalis, Chapman & Hall, (1996)

    Google Scholar 

  2. P. Katsavos, V. Varadharajan: A secure Frame Relay service, Computer Networks and ISDN Systems, 26 (1994)

    Google Scholar 

  3. W. Stallings: Network and Internetworking Security, Principles & Practice, IEEE Press, (1995)

    Google Scholar 

  4. ISO: Information Processing Systems — Open Systems Interconnection Reference Model — Security Architecture, ISO 7498-2, (1988)

    Google Scholar 

  5. ETRI: Development of a Security Service Server for Information Security Services, ETRI Research report, (1995.12)

    Google Scholar 

  6. J. Case, K. McCloghrie, M.Rose, S. Waldbusser: Structure of Management Information for Version 2 of SNMPv2 (RFC1902), (1996.1)

    Google Scholar 

  7. ITU-T: X.435 Message Handling Systems: Electronic Data Interchange Messaging System, (1992)

    Google Scholar 

  8. ITU-T: X.400 Message Handling Systems: Systems and Service Overview, (1992)

    Google Scholar 

  9. UN: EDIFACT (Electronic Data Interchange for Administration, Commerce and Transport) Syntax Rules (ISO 9735), UN / ECE, WP.4., (1993.3)

    Google Scholar 

  10. ISO / IEC: CD 11577, Network Layer Security Protocol (NLSP), (1991.12)

    Google Scholar 

  11. ISO / IEC: DIS 10736, Transport Layer Security Protocol (TLSP), (1991.12)

    Google Scholar 

  12. ITU-T: X.509 The Directory-Authentication Framework, (1988)

    Google Scholar 

  13. D. Perkins, E. McGinnis: Understanding SNMP MIBs, Prentice Hall Inc, (1997)

    Google Scholar 

  14. J. H. Lee: Data Structure of Secure EDI System, The 2nd Symposium proc. of Secure EDI-related technology, ETRI, (1996)

    Google Scholar 

  15. U. Blumenthal, B. Wijnen: User-based Security Model (USM) for SNMPv3, IETF Internet-Draft, (1997.11)

    Google Scholar 

  16. W. Stallings: SNMP, SNMPv2, and CMIP, The Practical Guide to Network-Management Standards, Addison-Wesley Pub. Co., (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yoshifumi Masunaga Takuya Katayama Michiharu Tsukamoto

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, TK. (1998). Design of EDI security MIB based on SNMP protocol. In: Masunaga, Y., Katayama, T., Tsukamoto, M. (eds) Worldwide Computing and Its Applications — WWCA'98. WWCA 1998. Lecture Notes in Computer Science, vol 1368. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-64216-1_56

Download citation

  • DOI: https://doi.org/10.1007/3-540-64216-1_56

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64216-9

  • Online ISBN: 978-3-540-69704-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics