{"title":"A systems approach to network security in private ISDN","authors":"B. Hamersma, J. Prinsloo, C.F.P. Jordaan","doi":"10.1109/COMSIG.1992.274310","DOIUrl":null,"url":null,"abstract":"The point of departure was the use of commercially available ISDN terminals and switching equipment and applying network security measures as add-on units. This approach could be used meaningfully by any network operator or user, as determined by individual security requirements, for implementing (or migrating) to a transparent secure network, with ease of use and maximum availability of features. This paper emphasises the system issues, rather than the implementation details. The layered ISDN model is discussed, with the considerations for placement of security services. End-to-end and link-oriented security measures are compared. Security in the terminal, switch and transmission systems is discussed. Key distribution and network management implications are referred to.<<ETX>>","PeriodicalId":342857,"journal":{"name":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1992 South African Symposium on Communications and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSIG.1992.274310","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The point of departure was the use of commercially available ISDN terminals and switching equipment and applying network security measures as add-on units. This approach could be used meaningfully by any network operator or user, as determined by individual security requirements, for implementing (or migrating) to a transparent secure network, with ease of use and maximum availability of features. This paper emphasises the system issues, rather than the implementation details. The layered ISDN model is discussed, with the considerations for placement of security services. End-to-end and link-oriented security measures are compared. Security in the terminal, switch and transmission systems is discussed. Key distribution and network management implications are referred to.<>