首页 | 官方网站   微博 | 高级检索  
     

下一代网络的安全技术
引用本文:滕志猛,吴波,韦银星.下一代网络的安全技术[J].中兴通讯技术,2007,13(5):31-36.
作者姓名:滕志猛  吴波  韦银星
作者单位:中兴通讯股份有限公司 江苏南京210012
摘    要:随着NGN技术和Everything over IP的发展,网络安全将变得越来越重要。ITUX.805标准定义的3层3面8个维度的端到端安全体系架构是开展信息网络安全技术研究和应用的基础。NGN有安全策略,认证、授权、访问控制和审计,时间戳与时间源等安全需求;NGN按照逻辑方式和物理方式对网络进行划分,形成不同的安全域对应着特定的安全策略。通过身份识别、认证与授权,传送安全,访问控制,审计与监控等安全机制,实现网络的安全需求。

关 键 词:下一代网络  安全需求  安全体系架构  安全机制
文章编号:1009-6868(2007)05-0031-06
收稿时间:2007-07-20
修稿时间:2007年7月20日

Security Technologies for NGN
TENG Zhi-meng,WU Bo,WEI Yin-xing.Security Technologies for NGN[J].ZTE Communications,2007,13(5):31-36.
Authors:TENG Zhi-meng  WU Bo  WEI Yin-xing
Abstract:With the development of NGN technologies and Everything over IP, network security has become an important part of the current network. The 3 layers x 3 planes x 8 dimensions security architecture defined by ITU X.805 for the end-to-end communications is the basis of the research and application of network security technologies. NGN has several security requirements including security strategy, authentication, authorization, access control and audit, time stamp and time source. NGN divides the network into different security areas in both logical and physical ways, and there are different security strategies for different areas. Through the security mechanisms of identification, authentication and authorization, transmit security, access control, audit and supervision, the security requirements of the network would be realized.
Keywords:NGN  security requirement  security architecture  security mechanism
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号