Skip to main content

Surveillance and protection in IBC management

The applicability of two RACE security projects — Securenet II and SESAME

  • Conference paper
  • First Online:
  • 141 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 851))

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ISO10181-7; Open Systems Security Framework — Security Audit

    Google Scholar 

  2. ISO 7498-2: Information Processing Systems — Open Systems Interconnection: Basic Reference Model — Security Architecture, ISO, February 1989

    Google Scholar 

  3. X.509: CCITT Directory — Authentication Framework

    Google Scholar 

  4. Samson Security Management in a Health-Care Scenario (in these proceedings)

    Google Scholar 

  5. Christmas, P., “Network Security Manager”, Elsevier, 1992.

    Google Scholar 

  6. P. Spirakis, S. Katsikas, et al. “SecureNet: A Network Oriented Attack Detection and Prevention System” — Proc. IFTP SEC'94, Cuaracao, May 1994.

    Google Scholar 

  7. R. Ostrovsky and M Yung “How to withstand mobile virus attacks” — PODC 1991 proc. pgs 51–59

    Google Scholar 

  8. ALMAP 3.2 SECURITY — Feasibility Study Draft 01-MAR-94 (Alcatel internal paper)

    Google Scholar 

  9. ITU Recommendation M.3010 — Principles for a TMN

    Google Scholar 

  10. ISO 10181-3: Access Control Framework

    Google Scholar 

  11. Generic Security Services Application Program Interface (GSS-API) — Security Attribute and Delegation Extensions; X/open S.307

    Google Scholar 

  12. GSS-API; X/Open P.308

    Google Scholar 

  13. ACTS Workplan, Draft 4 — Background Material, 26 May 1994; DGXIII-B (draft material for consultation)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hans-Jürgen Kugler Al Mullery Norbert Niebert

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Androutsopoulos, D., Kaijser, P., Katsikas, S., Presttun, K., Salmon, D., Spirakis, P. (1994). Surveillance and protection in IBC management. In: Kugler, HJ., Mullery, A., Niebert, N. (eds) Towards a Pan-European Telecommunication Service Infrastructure — IS&N '94. IS&N 1994. Lecture Notes in Computer Science, vol 851. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013398

Download citation

  • DOI: https://doi.org/10.1007/BFb0013398

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-58420-9

  • Online ISBN: 978-3-540-48784-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics