Abstract
This document proposes a PKI (Public Key Infrastructure) and a certification policy for inter-domain management between telecommunications providers, and for customer access to management functionality offered by providers. The PKI root is an Inter-domain Management Certification Authority (CA) which certifies CAs within the providers' domains. Relations to existing (or forthcoming) PKIs, security requirements, procedures for certification, and key escrow issues are outlined. Subjects in this context are either management applications or organisational /role identities.
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R., Roe, M.: The GCHQ Protocol and Its Problems, Proceedings of the EUROCRYPT'97 Conference (1997)
CEC: Towards a European Framework for Digital Signatures and Encryption, Communication from the Commission to the European Parliament et. al., adopted by the Commission on 8. October 1997 (1997)
ACTS Project 112 TRUMPET Deliverable 2, Inter-TMN Security Policies (1996)
ACTS Project 112 TRUMPET Deliverable 7, Security Policies and System Architecture Specification (1997)
Diffie, W., Hellman, M.E.: New Directions in Cryptography, IEEE Transactions on Information Theory, IT-11 (1976) 644–654
ETSI: Requirements Specification for an Encryption Algorithm for Operators of European Public Telecommunications Networks, ETSI TC-TR NA/STAG 5 (93) 123 rev. 4 (1993)
http://www.darmstadt.gmd.de/ice-tel
ITU-T M.3010: Principles of a Telecommunications Management Network (1995)
ITU-T X.509 ISO/IEC 9594-8: OSI — The Directory — Part 8: Authentication Framework, Revision 1 (1995)
ITU-T X.509 Amendment 1 ISO/IEC 9594-8 Amd 1: OSI — The Directory — Part 8: Authentication Framework — Amendment 1: Certificate Extensions (1995)
ITU-T X.810 ISO/IEC 10181-1: OSI — Security Frameworks for Open Systems, Part 1: Overview (1996)
OECD: Recommendations of the Council Concerning Guidelines for Cryptography Policy, document C/M(97)6/PROV (1997)
RFC 1421-1424: Privacy Enhancement for Internet Electronic Mail (1994)
RFC 1777: Lightweight Directory Access Protocol (1995)
RFC 2078: Generic Security Service Application Program Interface, Version 2 (1997)
Jefferies, N., Mitchell, C., Walker, M.: A proposed Architecture for Trusted Third Party Services, Proceedings of the PKCS '96 Conference (1996)
http://www.darmstadt.gmd.de/secude
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ølnes, J., Verdier, M., Ganivet, N., Maillot, D., Skretting, J. (1998). Public Key Infrastructure and certification policy for inter-domain management. In: Trigila, S., Mullery, A., Campolargo, M., Vanderstraeten, H., Mampaey, M. (eds) Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services. IS&N 1998. Lecture Notes in Computer Science, vol 1430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0056996
Download citation
DOI: https://doi.org/10.1007/BFb0056996
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64598-6
Online ISBN: 978-3-540-69343-7
eBook Packages: Springer Book Archive