{"title":"九十年代电话网络的安全问题","authors":"J. Brewster, H. Kluepfel, T.C. Peak","doi":"10.1109/CCST.1989.751958","DOIUrl":null,"url":null,"abstract":"In the 90s three major network architectures will emerge and eventually combine into a single public network Infrastructure. These are the Integrated Digital Services Network (ISDN), the Intelligent Network (IN) and the Broadband Integrated Digital Services Network (BISDN). Developments of thebe architectures have to some extent been promulgated independently of each other mainly due to different perceived needs being addressed. As these architectures are deployed in the telephone network, a single ubiquitous, Intelligent, integrated, broadband infrastructure will evolve. The major needs producing this rapid evolution of the public network in the United States include (but are not limited to): 1. The need to provide new digital services in a cost effective manner, 2. The need to provide services in a timely fashion. 3. The need to provide high bandwidth services for the transmission of video and data. 4. The need to provide the customer more control over his or her services. 5. The need to interact and interface with more diverse public and private networks. 6. The need to meet regulations requiring the \"opening up\" of the public network to other service vendors. 7. The need to become part of the global community and to support International standards. B. The need to provide capabilities/functions within the network to meet customer needs. As each of these needs pushes the evolution of the public network, the network's security requirements and exposures are also changing. This paper will look at those changes and approaches to address them","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security in the telephone network of the 90's\",\"authors\":\"J. Brewster, H. Kluepfel, T.C. Peak\",\"doi\":\"10.1109/CCST.1989.751958\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the 90s three major network architectures will emerge and eventually combine into a single public network Infrastructure. These are the Integrated Digital Services Network (ISDN), the Intelligent Network (IN) and the Broadband Integrated Digital Services Network (BISDN). Developments of thebe architectures have to some extent been promulgated independently of each other mainly due to different perceived needs being addressed. As these architectures are deployed in the telephone network, a single ubiquitous, Intelligent, integrated, broadband infrastructure will evolve. The major needs producing this rapid evolution of the public network in the United States include (but are not limited to): 1. The need to provide new digital services in a cost effective manner, 2. The need to provide services in a timely fashion. 3. The need to provide high bandwidth services for the transmission of video and data. 4. The need to provide the customer more control over his or her services. 5. The need to interact and interface with more diverse public and private networks. 6. The need to meet regulations requiring the \\\"opening up\\\" of the public network to other service vendors. 7. The need to become part of the global community and to support International standards. B. The need to provide capabilities/functions within the network to meet customer needs. As each of these needs pushes the evolution of the public network, the network's security requirements and exposures are also changing. This paper will look at those changes and approaches to address them\",\"PeriodicalId\":288105,\"journal\":{\"name\":\"Proceedings. International Carnahan Conference on Security Technology\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-10-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1989.751958\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1989.751958","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In the 90s three major network architectures will emerge and eventually combine into a single public network Infrastructure. These are the Integrated Digital Services Network (ISDN), the Intelligent Network (IN) and the Broadband Integrated Digital Services Network (BISDN). Developments of thebe architectures have to some extent been promulgated independently of each other mainly due to different perceived needs being addressed. As these architectures are deployed in the telephone network, a single ubiquitous, Intelligent, integrated, broadband infrastructure will evolve. The major needs producing this rapid evolution of the public network in the United States include (but are not limited to): 1. The need to provide new digital services in a cost effective manner, 2. The need to provide services in a timely fashion. 3. The need to provide high bandwidth services for the transmission of video and data. 4. The need to provide the customer more control over his or her services. 5. The need to interact and interface with more diverse public and private networks. 6. The need to meet regulations requiring the "opening up" of the public network to other service vendors. 7. The need to become part of the global community and to support International standards. B. The need to provide capabilities/functions within the network to meet customer needs. As each of these needs pushes the evolution of the public network, the network's security requirements and exposures are also changing. This paper will look at those changes and approaches to address them