Yan Liu, Wenxiu Fu, W. Guo, Hairong Zhang, Yang Yang
{"title":"TMN中的信息安全策略与安全模型设计","authors":"Yan Liu, Wenxiu Fu, W. Guo, Hairong Zhang, Yang Yang","doi":"10.1109/IVEC.1999.830709","DOIUrl":null,"url":null,"abstract":"The article is to make some research in the field of TMN security. The security problems and the security threats of TMN network system are analyzed, and the security services against these threats are presented. Furthermore, the strategies for the services are mainly discussed, and comparison is made between them to show their advantages and shortcomings. In the end, the security model of TMN is showed.","PeriodicalId":191336,"journal":{"name":"Proceedings of the IEEE International Vehicle Electronics Conference (IVEC'99) (Cat. No.99EX257)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1999-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Information security strategy and design of security model in TMN\",\"authors\":\"Yan Liu, Wenxiu Fu, W. Guo, Hairong Zhang, Yang Yang\",\"doi\":\"10.1109/IVEC.1999.830709\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article is to make some research in the field of TMN security. The security problems and the security threats of TMN network system are analyzed, and the security services against these threats are presented. Furthermore, the strategies for the services are mainly discussed, and comparison is made between them to show their advantages and shortcomings. In the end, the security model of TMN is showed.\",\"PeriodicalId\":191336,\"journal\":{\"name\":\"Proceedings of the IEEE International Vehicle Electronics Conference (IVEC'99) (Cat. No.99EX257)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1999-09-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the IEEE International Vehicle Electronics Conference (IVEC'99) (Cat. No.99EX257)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IVEC.1999.830709\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE International Vehicle Electronics Conference (IVEC'99) (Cat. No.99EX257)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IVEC.1999.830709","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information security strategy and design of security model in TMN
The article is to make some research in the field of TMN security. The security problems and the security threats of TMN network system are analyzed, and the security services against these threats are presented. Furthermore, the strategies for the services are mainly discussed, and comparison is made between them to show their advantages and shortcomings. In the end, the security model of TMN is showed.