UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

- Trained on our vast library of engineering resources.

ATIS T1.TR.44

Security Management Guidelines to Support PCS

active, Most Current
Buy Now
Organization: ATIS
Publication Date: 1 November 1995
Status: active
Page Count: 29
scope:

This Technical Report defines the guidelines to support security management requirements related to authentication, privacy, user profile, anonymity, interoperability, security event management and emergency access. In the case of law enforcement, we will defer to public law requirements.

This Technical Report builds upon the baseline standards for Security Management, PCS OAM&P and the baseline EIA/TIA TR 46 Privacy & Authentication Security Requirements (1994 Vols 1&2, 1995 draft new) to provide PCS Security Management (Hereinafter referred to as TR46).

The baseline PCS OAM&P standard provides specifications up to the RP, but does not specify security management interface requirements. The baseline Security Management standard does not provide PCS specific security requirements. This Technical Report focuses on Security Management for PCS as shown in Figure 1.

Purpose

The purpose of this Technical Report is to present guidelines that should be used as a checklist in developing Security Management specifications (e.g. interface standards).

In addition, these guidelines facilitate the common understanding of PCS Security Management among PCS Network Element Suppliers, PCS Network Providers and PCS Service Providers.

Document History

ATIS T1.TR.44
November 1, 1995
Security Management Guidelines to Support PCS
This Technical Report defines the guidelines to support security management requirements related to authentication, privacy, user profile, anonymity, interoperability, security event management and...

References

Advertisement