Skip to main content

Public Key Infrastructure and certification policy for inter-domain management

  • Conference paper
  • First Online:
  • 1021 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1430))

Abstract

This document proposes a PKI (Public Key Infrastructure) and a certification policy for inter-domain management between telecommunications providers, and for customer access to management functionality offered by providers. The PKI root is an Inter-domain Management Certification Authority (CA) which certifies CAs within the providers' domains. Relations to existing (or forthcoming) PKIs, security requirements, procedures for certification, and key escrow issues are outlined. Subjects in this context are either management applications or organisational /role identities.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R., Roe, M.: The GCHQ Protocol and Its Problems, Proceedings of the EUROCRYPT'97 Conference (1997)

    Google Scholar 

  2. CEC: Towards a European Framework for Digital Signatures and Encryption, Communication from the Commission to the European Parliament et. al., adopted by the Commission on 8. October 1997 (1997)

    Google Scholar 

  3. ACTS Project 112 TRUMPET Deliverable 2, Inter-TMN Security Policies (1996)

    Google Scholar 

  4. ACTS Project 112 TRUMPET Deliverable 7, Security Policies and System Architecture Specification (1997)

    Google Scholar 

  5. Diffie, W., Hellman, M.E.: New Directions in Cryptography, IEEE Transactions on Information Theory, IT-11 (1976) 644–654

    Article  MathSciNet  Google Scholar 

  6. ETSI: Requirements Specification for an Encryption Algorithm for Operators of European Public Telecommunications Networks, ETSI TC-TR NA/STAG 5 (93) 123 rev. 4 (1993)

    Google Scholar 

  7. http://www.darmstadt.gmd.de/ice-tel

    Google Scholar 

  8. ITU-T M.3010: Principles of a Telecommunications Management Network (1995)

    Google Scholar 

  9. ITU-T X.509 ISO/IEC 9594-8: OSI — The Directory — Part 8: Authentication Framework, Revision 1 (1995)

    Google Scholar 

  10. ITU-T X.509 Amendment 1 ISO/IEC 9594-8 Amd 1: OSI — The Directory — Part 8: Authentication Framework — Amendment 1: Certificate Extensions (1995)

    Google Scholar 

  11. ITU-T X.810 ISO/IEC 10181-1: OSI — Security Frameworks for Open Systems, Part 1: Overview (1996)

    Google Scholar 

  12. OECD: Recommendations of the Council Concerning Guidelines for Cryptography Policy, document C/M(97)6/PROV (1997)

    Google Scholar 

  13. RFC 1421-1424: Privacy Enhancement for Internet Electronic Mail (1994)

    Google Scholar 

  14. RFC 1777: Lightweight Directory Access Protocol (1995)

    Google Scholar 

  15. RFC 2078: Generic Security Service Application Program Interface, Version 2 (1997)

    Google Scholar 

  16. Jefferies, N., Mitchell, C., Walker, M.: A proposed Architecture for Trusted Third Party Services, Proceedings of the PKCS '96 Conference (1996)

    Google Scholar 

  17. http://www.darmstadt.gmd.de/secude

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Sebastiano Trigila Al Mullery Mario Campolargo Hans Vanderstraeten Marcel Mampaey

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ølnes, J., Verdier, M., Ganivet, N., Maillot, D., Skretting, J. (1998). Public Key Infrastructure and certification policy for inter-domain management. In: Trigila, S., Mullery, A., Campolargo, M., Vanderstraeten, H., Mampaey, M. (eds) Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services. IS&N 1998. Lecture Notes in Computer Science, vol 1430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0056996

Download citation

  • DOI: https://doi.org/10.1007/BFb0056996

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64598-6

  • Online ISBN: 978-3-540-69343-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics