Download presentation
Presentation is loading. Please wait.
Published byAlannah Goodwin Modified over 9 years ago
1
The need for further standards and technical developments Brian Moore ITU-T Study Group 13 Chairman Lucent Technologies
2
Contents Overview of ITU-T work on GII and IP networking Survey of ITU-T security and encryption standards Pointers to new standards requirements
3
G8 Information Society Projects Global Inventory Global Interoperability of Broadband Networks Trans-cultural Education and Training Electronic libraries Multimedia Access to World Cultural Heritage
4
Environment and Natural Resources Management Global Emergency Management Global Healthcare Applications Government On-Line Global Marketplace for SMEs Maritime Information Society
5
GII Objectives The GII must be designed to : enable information providers and users (e.g. individuals, information users, information providers, and information service providers) to communicate securely with each other any time and anywhere at acceptable cost and with acceptable quality
6
provide a set of communication services support a multitude of open applications embrace all forms of information and information generation (audio, text, data, image, video, etc.), and of its use and transportation operate in a transparent, user-friendly and straightforward way
7
provide seamless, interconnected and interoperable communication networks, information processing equipment, data- bases and terminals (including TV-sets) enable competition between the players in the information and telecommunications (including broadcasting) sectors
8
GII Projects Frameworks Network issues Middleware Applications
9
IP Aspects Explosive growth of IP based networks Data traffic growing ten times faster than voice traffic In near future will account for over 80% of all traffic on telecomms networks Business directions are changing
10
Shorter development cycles Shorter life cycles for services and products Standards bodies must be able to respond
11
Interoperability of IP and telecomms networks and of their services is of major concern IP based services are required with the speed, capacity, ease of use, reliability and integrity that has been associated with the world wide public telephone network
12
The ITU-T IP Project In its capacity as ‘Lead Study Group for IP related studies’ Study Group 13 has developed an ‘ITU-T IP Project’ which: –is separate from, but closely related to GII studies –is intended to encompass all related ITU-T work
13
Project Areas Area 1 - Integrated architecture Area 2 - Impact to telecommunications access infrastructures of access to IP applications Area 3 - Interworking between IP based network and switched-circuit networks, including wireless based networks
14
Area 4 - Multimedia applications over IP signals Area 5 - Numbering and addressing Area 6 - Transport for IP-structured signals Area 7 - Signalling support, IN and routing for services on IP-based networks Area 8 - Performance
15
Area 9 - Integrated management of telecom and IP-based networks Area 10 - Security aspects Area 11 - Network capabilities including requirements for resource management Area 12 - Operations and Maintenance (OAM) for IP
16
Scope of the Project
17
IP Project Area 10 – Security Aspects Scenarios include: A voice call from an IP terminal connected to an IP-based network to a GSTN phone A voice call from a GSTN phone to an IP terminal connected to an IP-based network A voice call from a GSTN phone to another GSTN phone via an IP network A voice call from an IP terminal connected to an IP-based network to another IP terminal connected to an IP-based network via the GSTN
18
Rec X.509 Information technology – Open Systems Interconnection – The Directory: Authentication framework Issued jointly with the ISO Version 6 currently being worked on, target 2001 Amendments provide extensions to the Directory to support enhancements for public key certificate and attribute certificate framework extensions and certificate revocation.
19
Other current work in Study Group 7 Rec x.sio Information Technology – Security Techniques – Security Information Objects Rec x.ttp1 Information Technology – Security Techniques – Guidelines on the use and management of Trusted Third Party services Rec x.ttp2 Information Technology – Security Techniques – Specification of TTP services to support the application of digital signatures
20
Security work in Study Group 16 related to multimedia Rec H.233 Confidentiality system for audio visual services Rec H.234 Encryption key management and authentication system for audio visual services Rec H.235 Security and encryption for H Series (packet based) multi media terminals
21
GII Project M3 Technical Framework for Electronic Commerce the support of standardized transactions, i.e. presentation of the offer, navigation and selection the exchange of commercial documents such as orders, invoices, contracts the support of delivery, especially with regard to electronic goods a high level of security means for the support of payments
22
Pointers to new standards requirements Much of the current debate is not about standards but the security environment and administrative / regulatory issues Many of the necessary standards are in place or are being enhanced but further extensions could be considered to support and / or enable further harmonisation of authentication technologies
23
Possible areas for further standards work Additional information fields in Rec X.509? Addition of generic attributes plus various extensions for different contracts etc? Extensibility profiles? Others?
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.