Security in Telecommunications and Information Technology 2012
Hide / Show Abstract

Security in Telecommunications and Information Technology 2012

An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications

The purpose of the ITU-T Manual on Security in Telecommunications and Information Technology is to provide a broad introduction to the security work of ITU-T. It is directed towards those who have responsibility for, or an interest in, information and communications security and the related standards, and those who simply need to gain a better understanding of ICT security issues and the corresponding ITU-T Recommendations.

Click to Access: 
    http://oecd.metastore.ingenta.com/content/pub-80601e27-en.pdf
  • PDF
  • http://www.keepeek.com/Digital-Asset-Management/oecd/science-and-technology/security-in-telecommunications-and-information-technology-2012_pub/80601e27-en
  • READ
 
Chapter
 

Authentication and the role of the Directory You do not have access to this content

English
Click to Access: 
    http://oecd.metastore.ingenta.com/content/pub-80601e27-f2a00181-en.pdf
  • PDF
  • http://www.keepeek.com/Digital-Asset-Management/oecd/science-and-technology/security-in-telecommunications-and-information-technology-2012_pub/80601e27-f2a00181-en
  • READ
Author(s):
ITU

Hide / Show Abstract

Authentication is an increasingly-important security service which relies, to a considerable extent, on directory services. In addition to supporting authentication, the Directory supports a number of other key security services and some of the mechanisms that are used to provide the services, in particular cryptographic services.