With the development of NGN technologies and everything over IP,network security has become an important part of the current network.The 3 layers by 3 planes by 8 dimensions security architecture defined by ITU X.805 ...With the development of NGN technologies and everything over IP,network security has become an important part of the current network.The 3 layers by 3 planes by 8 dimensions security architecture defined by ITU X.805 for systems providing end-to-end communications is the basis of the research and application of network security technologies.NGN has several security requirements including security strategy,authentication,authorization,access control and audit,time stamp and time source.NGN divides the network into different security areas in both logical and physical ways,and there are different security strategies for different areas.Through the security mechanisms of identification,authentication and authorization,transmit security,access control,audit and supervision,etc,the security requirements of the network would be realized.展开更多
文摘With the development of NGN technologies and everything over IP,network security has become an important part of the current network.The 3 layers by 3 planes by 8 dimensions security architecture defined by ITU X.805 for systems providing end-to-end communications is the basis of the research and application of network security technologies.NGN has several security requirements including security strategy,authentication,authorization,access control and audit,time stamp and time source.NGN divides the network into different security areas in both logical and physical ways,and there are different security strategies for different areas.Through the security mechanisms of identification,authentication and authorization,transmit security,access control,audit and supervision,etc,the security requirements of the network would be realized.