hash stringlengths 32 32 | doc_id stringlengths 7 13 | section stringlengths 3 121 | content stringlengths 0 2.2M |
|---|---|---|---|
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 7.8.3 Privacy | Privacy is a security concept that protects transmitted data from being intercepted and understood by third parties (e.g. an "enemy" subscriber unit, base station or passively "listening" radio). The system should allow a cryptographic algorithm to be employed that is internationally applicable. Facilities shall also b... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8 Operational requirements | |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.1 User density and market penetration | |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.1.1 Residential market | Caution has to be taken with figures for "average" household density, as local peaks can be much larger than the average for a large area. Table 4 gives figures for typical household densities in a square kilometre in Europe and the likely range of variations on a smaller scale. Table 4: Typical household densities in ... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.1.2 SOHO and Small Enterprise market | In a business a number of employees can use broadband services simultaneously through a single company subscription (probably sharing the access transceiver through an internal network). Little data seems to be available on the actual density of businesses. However, data is available on the proportions of businesses ac... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.2 User reference traffic models | These traffic models are presented for the purposes of understanding the traffic mix and estimating spectrum requirement. They are thought to be reasonable projections or current trends but are not based on specific market research. |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.2.1 Residential users | The main residential user applications that can be foreseen today are as follows: • Internet access It is assumed that 100 % of subscriber households will use Internet access. From statistics gathered within a business environment an average Internet user may download at an average rate of about 24 kbit/s in the busy h... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.2.2 Business users | The main business user applications that can be foreseen today are as follows: • Internet Access: It is assumed that 100 % of businesses will have Internet access. The utilization per employee is assumed to be the same inbound as in the residential case, and outbound rates more equal, as a significant number of busines... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.3 Installation aspects | Environmental concerns mean that a HIPERMAN ODU (if the SU includes an ODU) including antenna on customer premises must be small (less than 45 cm in all dimensions). End-User installation shall be supported. The HIPERMAN system should allow a design to include any functionality necessary to enable the economical instal... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.4 Capacity | The system capacity requirement is a function of the number of users, their bandwidth requirements and traffic characteristics (contracted service levels with users). This can for example be optimized by radio resources reservation schemes. In a given system instance, capacity has to be planned to ensure that the user'... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.5 Radio range and coverage | The range guidelines, given in Table 3, are aimed at the bands around 3,5 GHz. However, at frequencies around 10 GHz, heavy rain or snow can cause strong attenuation and unavailability events. Additional attenuation will be caused by atmospheric absorption by oxygen, hydroxyl ions, and fog. If a network is deployed in ... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.6 Maintaining QoS | A number of problems can arise during the operation of a network which affect the quality of the service delivered to the SU: • The radio path may become obstructed, either temporarily or permanently. • Sporadic co- and adjacent channel interference can arise from within the system or from other systems. • As the netwo... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.7 Environmental conditions | HIPERMAN is intended to operate with in- and outdoor equipment. The equipment shall meet appropriate classes defined in ETS 300 019 [10] and should meet other relevant regional standards |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.8 ElectroMagnetic Compatibility (EMC) and safety | The system shall conform to the EMC standards EN 301 489-1 [11], ETS 300 385 [12] and ETS 300 386-2 [13]. The emerging EMC standard EN 301 753 [14] should be taken into consideration. The system shall also conform to the applicable parts of electrical safety document EG 201 212 [16]. This Technical Report has not taken... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 8.9 Standardization requirements | The HIPERMAN standard shall describe the PHY and DLC layers, which shall be core network independent. The core network specific Convergence sublayer(s) shall be specified as part of the standard. It has to be noted that to specify a complete HIPERMAN based system, other specifications, e.g. for the Network layer and hi... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 9 Comparison with HIPERACCESS and HIPERLAN/2 | In order to assess to what extent the existing standards HIPERACCESS and HIPERLAN/2 meet the requirements for HIPERMAN identified in the preceding text, each mandatory, recommended and optional requirement, as abstracted in Table 8, Table 9 and Table 10 respectively, is evaluated. |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 9.1 Comparison with HIPERACCESS | As HIPERACCESS is under standardization, comparison between HIPERMAN and HIPERACCESS cannot be fully made, yet. The major differences between HIPERACCESS and HIPERMAN are, that HIPERMAN intends to serve the users in a NLOS environment and that the operating frequencies for HIPERMAN are much lower, resulting in signific... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 9.2 Comparison with HIPERLAN/2 | The PHY layer of HIPERLAN/2 is designed for a maximum delay spread of 800 ns, which is insufficient for FWA networks, which typically have much longer delay spreads. The use of 64 FFT in HIPERLAN/2 with such long delay spreads will cause significant PHY overhead. The relatively loose spectral mask of HIPERLAN/2 may als... |
01fd32af3b06c1a479ed7241eb93d694 | 101 856 | 9.3 Recommendations for HIPERMAN | Recognizing that a wide diversity exists in regulations, specifically but not limited to bandwidth, spectral mask and duplex spacing, it is recommended that at the outset of the HIPERMAN standardization, a detailed study of the regulations and existing licensing and deployments of individual nations is performed in ord... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 1 Scope | The present document is the outcome of continuing studies in TC MTS aimed at improving the technical quality of standards (and other types of deliverable) drafted in ETSI Technical Bodies. It contains a description of a set of macros operating under the ETSI-approved word processor Microsoft Word 7™contained in Office ... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 2 References | The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. • For a specific reference, subsequent revisions do not apply. • Fo... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 3 Definitions and abbreviations | None. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 4 Introduction | The technical accuracy and correctness of a standard is more important than on the finer details of presentation. Yet, it is hard to communicate with editors/rapporteurs as they are usually short of time and disinclined to read reports or guides that they do not consider to be essential. The approach has therefore been... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5 The Macros | The macros work only in Microsoft Word 7 as in Office 95. They do NOT work in Office 97. A version for Office 97 may be produced later. The macros are written for English versions of Word. Some macros may work in other language versions but some will not. The macros are contained in a template that should be loaded alo... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.1 Scope and Language Macros | |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.1.1 Shall/Should; Is/Are; May; Can; Could; May Not; Must | These macros colour and double underline each occurrence of the word in your document. They then return the cursor to where you started in your document. Blue: - denotes a word that can be used in normative text. Magenta: - used only for SHOULD whose status should be clarified. Green: - denotes a word that is either in... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.1.2 Remove Colour | Removes the colouring and any double underlining. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.1.3 Section Para | Colours and double underlines all occurrences of SECTION, PARAGRAPH and PARA in red and gives a list of page numbers where they occur. These terms should not be used for referring to parts of an ETSI document. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.1.4 Occurrences | Colours and double underlines all occurrences of a word that you specify, and allows you to choose the colour. You can use this in long documents to check where you have covered particular topics |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.1.5 Scope | Finds the SCOPE clause and inserts a check list of important issues to be included. Check that you have covered them and then delete the checklist. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.2 Abbreviations & Definitions | |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.2.1 Abbreviations: Colour | Runs through Abbreviations clause and checks use of each one. Colours used abbreviations green and unused ones red. Colours blue each occurrence of each abbreviation after the Abbreviations section so you can see which abbreviations are uncoloured and need to be added to the list. Identifies the Abbreviations clause by... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.2.2 Abbreviations: Add | Select an abbreviation in the main body of the document and then run this macro. The macro checks whether the abbreviation is used and if not prompts you to add the meaning (expansion). The abbreviation and meaning are then added to the end of the Abbreviations clause and the cursor is returned to where you started. If... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.2.3 Abbreviations: Go To | Goes to the start of the list with style EW in the Abbreviations clause. Identifies the Abbreviations clause by finding the word ABBREVIATION in style Heading 1 or Heading 2, followed by style EW for each abbreviation. ETSI ETSI TR 101 778 V1.1.2 (2000-02) 9 |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.2.4 Generate Master List: Abbreviations | Creates a files called abbs.doc in the same directory as the MTS template that contains the macros, if such a file is not already present. This file is then used by Abbreviations: ADD for collecting a master list of the abbreviations used in your document |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.2.5 Generate Master List: Definitions | Creates a files called defs.doc in the same directory as the MTS template that contains the macros, if such a file is not already present. This file is then used by Definitions: ADD for collecting a master list of the definitions used in your document. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.2.6 Add Definition | Select in the main body of the document a word or words that need to be defined and then run this macro. The macro checks whether the word(s) are already defined and if not prompts you to add the definition. The definition is then added to the Definitions clause and the cursor is returned to where you started. If the d... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.2.7 Sort List | Select a list of at least 2 lines and macro sorts list alphabetically. Do not use it within Tables |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.2.8 Remove Colour | Removes the colouring and any double underlining. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.3 Figures & Tables | |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.3.1 How to Use | Displays some instructions on use. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.3.2 Annexes | Displays some instructions about how to reset the number sequences in annexes. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.3.3 Table | Type in the caption in the correct place and click the Table button. The macro will add the correct Style, the word TABLE and the field code for the sequence number. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.3.4 Figure | Type in the caption in the correct place and click the Figure button. The macro will add the correct Style, the word FIGURE and the field code for the sequence number. ETSI ETSI TR 101 778 V1.1.2 (2000-02) 10 |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.3.5 Toggle Codes | Toggles the display of field codes so you can examine and problems. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.3.6 Update | Updates field codes starting from the Scope so that it avoids the Table of Contents to improve speed of operation. Displays the results of fields rather than the codes. To see the codes click TOGGLE CODES. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4 References | |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.1 Collect | Searches for references of the following type: - EN nnnn(nn); - ETS nnn nnn(-nn-nn); - ES nnn nnn(-nn); - EG nnn nnn; - TS nnn nnn(-nn); - TR nnn nnn(-nn); - ETR nnn(-nn); - ISO nnnn(n)(-nn); - IEC nnnn(n)(-nn); - ISO/IEC nnnn(n)(-nn); - ECMA nnn(n) - x.n(nnnn)(.nn) - ITU-T/CCITT Recommendations; - RFC nnn(n)(-nn), and... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.2 Add | Select the standard number of a new reference in the body of the standard and run the macro. Macro checks if the standard is already in the reference section. If it is not, it adds the [ ] and number (using SEQ and bookmark) at the end of the reference section, then returns to the original position and adds a copy of t... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.3 Check Use | Checks though the reference list and colours all used and colours the unused references red. Uses the stored list of reference types for finding references. This macro will work only with any types of reference stored in the RapHelp template. ETSI ETSI TR 101 778 V1.1.2 (2000-02) 11 |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.4 Colour Non Seqs | Within reference section, colours the [n] RED where n is a simple digit string. These references then need to be converted using CHANGE TO SEQ. NOTE: Does not colour references that use fields that are different from the system used in these tools. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.5 Change to Seq | To be used when the user has selected a standard number within the references section, not the number in []. Replaces the [ ] with sequences and underlying bookmarks, and replaces all occurrences of the original number with copies of the bookmarks. After this process, the bookmarks will be updateable automatically if t... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.6 Missing []s | Searches for all stored reference types and checks if a [ occurs in the subsequent 12 characters. Colours references without subsequent [ red and double underlines them. Generates a list of page numbers with such problems. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.7 Empty []s | Colours all occurrences of empty [ ] red and double underlines them. Generates a list if the pages on which they occur. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.8 Add [] in body | Select a standard number within the MAIN text. Adds the [ ] with sequences and underlying bookmarks, to the right of the selected text. After this process, the bookmarks will be updateable automatically if they are re-ordered or if new references are added. Does not add the reference to the Reference clause, for that y... |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.9 Remove Colour | Removes the colouring and any double underlining. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.10 Toggle Codes | Toggles the display of field codes so you can examine and problems. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.4.11 Update | Updates field codes starting from the Scope so that it avoids the Table of Contents to improve speed of operation. Displays the results of fields rather than the codes. To see the codes click TOGGLE CODES. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.5 Characters | |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.5.1 Correct Characters | Runs all the individual macros available under INDIVIDUAL CHARACTERS. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.5.2 Individual Characters | Displays another floating toolbar for making individual corrections. For details please use the Help file on that toolbar. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.5.3 Insert MU | Inserts the Greek character µ. ETSI ETSI TR 101 778 V1.1.2 (2000-02) 12 |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.5.4 Insert Deg | Inserts the degree symbol º. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.5.5 Get Ascii | Displays in a message box the ASCII value of any single character that you have selected. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.6 Individual Characters | |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.6.1 Correct Double Spaces | Replaces most double, treble and quadruple spaces with single, colours characters adjacent to remaining ones red for manual checking. Tells you how many manual checks needed. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.6.2 Remove Spaces before Punctuation | Removes all single spaces between letters and a subsequent punctuation mark ie ,.;:tab line break paragraph. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.6.3 Correct Hyphens | Replaces normal hyphens with non-breaking ones when preceded by a number or letter and followed by a number Changes ASCII (45) to ASCII (30). |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.6.4 Correct Spaces to Non-breaking | Replaces ordinary spaces with non-breaking ones when followed by a number and preceeded by: - - another number; - the word CLAUSE; - the abbreviation ETS, EN, ES, EG, TS, TR, ETR, ECMA, ISO, IEC, RFC. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.6.5 Correct to kbit/s | Replaces wrong abbreviations of bits per second, ie corrects: - - kb/s; Kb/s; Kbit/s to kbit/s; - mb/s; Mb/s; mbit/s to Mbit/s; - gb/s; Gb/s; gbit/s to Gbit/s. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.6.6 Correct Super and Subscripts | Replaces use of super and sub scripts with 8 point font shifted up or down by 3 points. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.6.7 Get Ascii | Displays in a message box the ASCII value of any single character that you have selected. ETSI ETSI TR 101 778 V1.1.2 (2000-02) 13 |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.7 Styles | |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.7.1 Set Revisions | Sets Revision marking with deleted text hidden and new text blue without underlining or revision lines in the margin. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.7.2 Revs Strike | Sets Revision marking with deleted coloured red and struck through, and new text blue without underlining or revision lines in the margin. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.7.3 Revs Off | Turns off Revision Marking. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.7.4 Accept / Reject | Accepts or Rejects revisions in selected text. You should select the revision before clicking the button. If used in Tables these macros may leave the whole row selected due to unexpected operation of the commands in Word. After using Accept or Reject, the Revisions are always set and you may need to turn them off. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.7.5 View Style Margin | Displays the style margin on the left of the document in NORMAL view so you can see easily what styles you are using. |
ffb234d350cb1d71d86fce475cba8309 | 101 778 | 5.7.6 Other macros | Apply the style shown on the button. Some buttons contain reminders of where the styles should be used. ETSI ETSI TR 101 778 V1.1.2 (2000-02) 14 Annex A (informative): List of macros Table A.1: Table relating Button Names to Macro Names Toolbar Buttons Macro MTS: Rapporteur Assistant Characters MTSmDisplayCharactersToo... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 1 Scope | The present document provides a comprehensive analysis of security threats to the TIPHON environment as described in principle in TS 101 313 [9]. It includes a definition of the security objectives, a description of the assets within the TIPHON environment, a list of threats to the TIPHON environment, a risk assessment... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 2 References | For the purposes of this Technical Report (TR) the following references apply: [1] ETSI ETR 332: "Security Techniques Advisory Group (STAG); Security requirements capture". [2] ETSI ETR 232: "Security Techniques Advisory Group (STAG); Glossary of security terminology". [3] ETSI TR 101 750: "Telecommunications and Inter... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 3 Definitions and abbreviations | |
54aede64413370e5b8c040dc45be9216 | 101 771 | 3.1 Definitions | For the purposes of the present document, the terms and definitions given in ETR 232 [2] and the following apply. NOTE: TIPHON is used in the following as synonym for "TIPHON compliant systems". federation: collection of networked systems that can interact (interoperate) without being part of a single management domain... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply: BE Back End BER Back End Routing function CH ClearingHouse DoS Denial of Service GK GateKeeper GW GateWay ID Identifier IETF Internet Engineering Task Force IP Internet Protocol ITSP IP-Telephony Service Provider MGC Media Gateway Controller M... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 4 Overview | The present document follows the methodology generally described in ETR 332 [1] and is therefore structured in the following way. ETSI ETSI TR 101 771 V1.1.1 (2001-04) 10 Figure 1: Structure of analysis TIPHON WG8 work (this document) Re-design System’s Design (clause 5) Security Objectives Definition (clause 6) System... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 5 System's Design | |
54aede64413370e5b8c040dc45be9216 | 101 771 | 5.1 Network Architecture | This clause describes the general TIPHON network architecture in order to provide a basis to perform a complete threat analysis as outlined in clause 4. It covers the step "System's Review". |
54aede64413370e5b8c040dc45be9216 | 101 771 | 5.2 General Design | In this clause the mapping of the functional to the physical architecture and the network procedures are shortly described. End to end service SCN SCN IP IP Figure 2: Overview of a general TIPHON domain TIPHON can be drawn as a network of networks where the constituent networks may be based upon IP or Circuit Switching... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 5.3 TIPHON Connectivity Scenarios | The TIPHON architecture is defined with respect to the support of a number of reference scenarios outlined below: • the delivery of telephone calls which originate in an IP network and are delivered to Switched Circuit Networks (SCN), such as Public Switched Telephone Network (PSTN), Integrated Services Digital Network... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 5.3.1 Scenario 1 | Call initiated from IP Network to SCN SCN IP Network IWF Local or distributed function H.323 terminal Phase I Phase 1 IP Access Access Figure 3: Scenario 1, Source on IP network to destination on SCN network ETSI ETSI TR 101 771 V1.1.1 (2001-04) 13 |
54aede64413370e5b8c040dc45be9216 | 101 771 | 5.3.2 Scenario 2 | Call initiated from SCN to IP Network IP Network IWF Local or distributed function H.323 terminal Phase I Phase 1 IP Access SCN Figure 4: Scenario 2, Source on SCN network to destination on IP network |
54aede64413370e5b8c040dc45be9216 | 101 771 | 5.3.3 Scenario 3 | IP Network IWF Local or distributed function P hase I P hase 1 IWF Local or distributed function SCN SCN Figure 5: Scenario 3, Source and destination on SCN network using an IP transit network ETSI ETSI TR 101 771 V1.1.1 (2001-04) 14 |
54aede64413370e5b8c040dc45be9216 | 101 771 | 5.3.4 Scenario 4 | IP Network IP Network IWF Local or distributed function P hase I P hase 1 IWF Local or distributed function H.323 terminal IP Access H.323 terminal IP Access PSTN/ISDN IP Network SCN Figure 6: Scenario 4, Source and destination on IP network (maybe using an SCN transit network) |
54aede64413370e5b8c040dc45be9216 | 101 771 | 5.4 Services | For further study. |
54aede64413370e5b8c040dc45be9216 | 101 771 | 6 Security Objectives | The requirements for TIPHON security originate from different sources: • Customers/Subscribers need confidence in services relying on EP TIPHON specifications, e.g. correct billing. In addition Customers/Subscribers demand availability of services, fair competition and privacy protection; • Network Operators/Service Pr... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 6.1 Main Security Objectives | The general security objectives of the present document can be summarized to the following main security objectives (with appropriate definitions from ETR 332 [1]): • confidentiality The avoidance of the disclosure of information without the permission of its owner. • integrity The property that data has not been alter... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 6.2 Customers' (Subscribers') Objectives | The objectives of customers are not uniform. An enterprise does not always require the same as a private person. The following list gives examples of possible objectives which may have implications on security: • availability and correct functionality of service subscription (including reachability, availability and co... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 6.3 Objectives of (TIPHON) Service and Network Providers | The following list gives examples of objectives that may have implications on security: • availability and correct functionality of network procedures for TIPHON; • availability and correct functionality of service, network and element management for TIPHON; • correct and verifiable billing and accounting, above all no... |
54aede64413370e5b8c040dc45be9216 | 101 771 | 6.4 Manufacturers' Objectives | The following list gives examples of objectives that may have implications on security: • fulfilling market objectives; • preservation of reputation. |
54aede64413370e5b8c040dc45be9216 | 101 771 | 7 System's Review | In this first edition of the Threat Analysis the following architecture, which is derived from annex B of [15] forms the basis for evaluation and assessment. It has to be recognized that the architecture is subject to change as a result of the present document and thus may lead to revisions of the present document. ETS... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.