A Network Management Viewpoint on Security in e-Services

With the advent and the rapid growth of the Internet, e-services have proliferated. Indeed, e-commerce activities have played a vital role in expanding current business transactions to much higher levels by allowing a larger number of potential customers and companies to interact in a shorter time with lower costs. E-services include business information, processes, resources, and applications, which are supported through the Internet. As the popularity of e-services have grown, so has the need for effective security. All aspects of the e-service must be secured, using a variety of security mechanisms, objects, and functions. In order to maintain a secure system as a whole, security components must be managed. Therefore, the implementation of secure e-services cannot take place without full support from network management.

[1]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[2]  Stephen Farrell,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.

[3]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[4]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[5]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[6]  Uri Blumenthal,et al.  User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) , 1998, RFC.

[7]  Keith McCloghrie,et al.  Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2) , 1993, RFC.

[8]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[9]  Bert Wijnen,et al.  An Architecture for Describing SNMP Management Frameworks , 1998, RFC.

[10]  Jeffrey D. Case,et al.  Simple network management protocol , 1995 .

[11]  Paul Foley,et al.  Distributed systems management , 1997 .

[12]  Craig A. Finseth,et al.  An Access Control Protocol, Sometimes Called TACACS , 1993, RFC.

[13]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[14]  Philippe A. Janson Security for management and management of security , 1994 .

[15]  Andrea Westerinen,et al.  Terminology for Policy-Based Management , 2001, RFC.

[16]  Stephen T. Kent,et al.  Security Mechanisms in High-Level Network Protocols , 1983, CSUR.

[17]  Naganand Doraswamy,et al.  IP Security Document Roadmap , 1998, RFC.

[18]  Ralph Howard,et al.  Data encryption standard , 1987 .

[19]  Keith McCloghrie,et al.  COPS Usage for Policy Provisioning (COPS-PR) , 2001, RFC.

[20]  Ronda R. Henning,et al.  Security service level agreements: quantifiable security for the enterprise? , 1999, NSPW '99.

[21]  Andrew S. Tanenbaum,et al.  Distributed systems: Principles and Paradigms , 2001 .

[22]  James H. Burrows,et al.  Secure Hash Standard , 1995 .