Skip to main content

Surveillance and protection in IBC management

The applicability of two RACE security projects — Securenet II and SESAME

  • Conference paper
  • First Online:
Towards a Pan-European Telecommunication Service Infrastructure — IS&N '94 (IS&N 1994)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 851))

Included in the following conference series:

  • 141 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ISO10181-7; Open Systems Security Framework — Security Audit

    Google Scholar 

  2. ISO 7498-2: Information Processing Systems — Open Systems Interconnection: Basic Reference Model — Security Architecture, ISO, February 1989

    Google Scholar 

  3. X.509: CCITT Directory — Authentication Framework

    Google Scholar 

  4. Samson Security Management in a Health-Care Scenario (in these proceedings)

    Google Scholar 

  5. Christmas, P., “Network Security Manager”, Elsevier, 1992.

    Google Scholar 

  6. P. Spirakis, S. Katsikas, et al. “SecureNet: A Network Oriented Attack Detection and Prevention System” — Proc. IFTP SEC'94, Cuaracao, May 1994.

    Google Scholar 

  7. R. Ostrovsky and M Yung “How to withstand mobile virus attacks” — PODC 1991 proc. pgs 51–59

    Google Scholar 

  8. ALMAP 3.2 SECURITY — Feasibility Study Draft 01-MAR-94 (Alcatel internal paper)

    Google Scholar 

  9. ITU Recommendation M.3010 — Principles for a TMN

    Google Scholar 

  10. ISO 10181-3: Access Control Framework

    Google Scholar 

  11. Generic Security Services Application Program Interface (GSS-API) — Security Attribute and Delegation Extensions; X/open S.307

    Google Scholar 

  12. GSS-API; X/Open P.308

    Google Scholar 

  13. ACTS Workplan, Draft 4 — Background Material, 26 May 1994; DGXIII-B (draft material for consultation)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Hans-Jürgen Kugler Al Mullery Norbert Niebert

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Androutsopoulos, D., Kaijser, P., Katsikas, S., Presttun, K., Salmon, D., Spirakis, P. (1994). Surveillance and protection in IBC management. In: Kugler, HJ., Mullery, A., Niebert, N. (eds) Towards a Pan-European Telecommunication Service Infrastructure — IS&N '94. IS&N 1994. Lecture Notes in Computer Science, vol 851. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013398

Download citation

  • DOI: https://doi.org/10.1007/BFb0013398

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-58420-9

  • Online ISBN: 978-3-540-48784-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics