Security policies in OSI-management experiences from the DeTeBerkom project BMSec

https://doi.org/10.1016/0169-7552(95)00080-1Get rights and content

Abstract

Security problems of network management applications are well known, and some of their solutions are specified in the OSI X.700 series. However, there is little experience with implementations of the respective security functions. This paper provides a critical view on the OSI standards of authentication and access control for management applications. A special focus is on security policies. Another focus is on our experience with our implementation.

References (20)

  • P. Kirstein et al.

    Piloting authentication and security services within OSI applications for RTD information (PASSWORD)

    Comput. Networks ISDN Systems

    (1992)
  • M.T. Rose
  • W. Stallings
  • R. Grimm et al.

    Towards trust-worthy communication systems—experiences with the security toolkit SecuDE

  • SAMSON—Security And Management Services in Open Networks; Deliverable D2: Top Level Specification of the SAMSON Security Management Architecture

    (December 1992)

    SAMSON—Security And Management Services in Open Networks; Deliverable D3: Detailed Design Specifications

    (April 1993)
  • S. Bhatti et al.

    Secure remote management

  • R. Grimm et al.

    Beschreibung einer Sicherheitspolitik

    Working Document BMSEC-8

    (August 1994)
    R. Grimm et al.

    Dynamische Security Policy für Berman

    BMSEC-17

    (July 1994)
There are more references available in the full text version of this article.

Cited by (3)

View full text