ITU

Available (244)

Showing 49 - 60 per page



ITU-T - SG17 - X.5Gsec-netecSecurity capabilities of network layer for 5G edge computing

5G EC would play a key role on low latency services and traffic off-load services in 5G era. Several prominent factors would enlarge and complex the security risks to the network layer that supports 5G EC and even bring new security challenges to the network security operation. These factors would be the flexible network architectures of 5G, the variable deployment positions of EC, the various application scenarios, different types of users' private networks and access networks, etc. The boundaries among the telecommunication networks and the private networks would be more ambiguous, and the exposure surface would be expanded. Therefore, the security requirements and measures of the network layer including both of the telecommunication networks and the private networks would be recommended as telecommunication operators enjoying the benefit of EC.

ITU-T - SG17 - X.5Gsec-netec

Security requirements for software as a service application environments

Recommendation ITU-T X.1602 analyses the maturity levels of software as a service (SaaS) application and proposes security requirements to provide a consistent and secure service execution environment for SaaS applications. These proposed requirements originate from cloud service providers (CSP) and cloud service partners (CSN) as they need a SaaS application environment to meet their demands on security. The requirements are general and independent of any service or scenario specific model (e.g. web services, or representational state transfer (REST)), assumptions or solutions.

Security guidelines for container in cloud computing environment

Recommendation X.1643 analyses security threats and challenges on virtualization container in cloud computing environment and specifies a reference framework with security guidelines for virtualization container in cloud.

Security requirements for Communication as a Service application environments

Recommendation ITUT X.SRCaaS recommends the security requirements of communication as a service (CaaS) application environments with the identification of the risks. The Recommendation describes the scenarios and the features of CaaS, into which multicommunication capabilities are plugged. Moreover, some special /unique risks are identified, which are caused by the unique features of CaaS. The corresponding security requirements are recommended for the following aspects: Identity fraud, orchestration security, multi devices security, countering spam, privacy protection, infrastructure attack, attack from infrastructure, Intranet attack and so on. The Recommendation refers to the common security requirements of Recommendation ITUT X.1602 to avoid duplicated work. These measures in the requirements take into account the national legal and regulatory obligations in individual member states in which the platforms operate. The work applies the methodology standardized in clause 10 of Recommendation ITU-T X.1601.

Security requirements of public infrastructure as a service (IaaS) in cloud computing

Infrastructure as a Service (IaaS) is one of the representative categories of cloud services, in which the cloud capabilities service provided to the CSC is an infrastructure capabilities type. IaaS environments and virtualized services are facing more challenges and threats than traditional information technology infrastructure and application. Platforms that share computing, storage, and network services need protections specific to the threats in the IaaS environment. If these threats are not carefully addressed, it will have very negative impact on the development of IaaS services.Recommendation ITU- X.SRIaaS aims to document the security requirements of public IaaS. This will be helpful for IaaS CSPs to improve the overall security level throughout the planning, constructing and operating stages of IaaS platform and services. This work also complements the security standardization activity related to Software Defined Networks

Security requirements of Network as a Service (NaaS) in cloud computing

Network as a Service (NaaS) is one of the representative cloud service categories, in which the capability provided to the cloud service customer (CSC) is transport connectivity and related network capabilities. NaaS services can provide any of three cloud capabilities as: NaaS application service, NaaS platform service and NaaS connectivity service. All the three kinds of NaaS service face particular security challenges such as application security vulnerabilities, security risks of network virtualization, eavesdropping, etc. Recommendation ITU-T X.SRNaaS analyses the security challenges and security requirements of NaaS application, NaaS platform and NaaS connectivity. This Recommendation could help NaaS service providers to address on the security issues. The capabilities provided by this Recommendation will take into account the national legal and regulatory obligations in individual Member States in which the NaaS services operate.The methodology of this proposal would follow the recommendations of clause 10 in Recommendation ITU-T X.1601.

Data aware networking (information centric networking) – Requirements and capabilities

This Recommendation specifies the requirements and capabilities of data aware networking (DAN) to realize the use cases and scenarios described in ITU-T Supplement 35 to Recommendation Y.3033, Data aware networking - Scenarios and use cases, which are expected to be major applications/services provided on DAN. One of the objectives reflecting emerging requirements for future networks (FNs) is data awareness as specified in ITU-T Recommendation Y.3001 - Future networks: Objectives and design goals. DAN is expected to have capabilities optimized to handle enormous amount of data and to enable users to access desired data safely, easily, quickly, and accurately, regardless of their location by making information the destination of request delivery. DAN can be rephrased as the networking whose central concern is retrieving information, i.e., information centric networking (ICN).

Proof-of-concept for data service using information centric networking in IMT-2020

This Supplement specifies a proof-of-concept for a service that provides named data such as Internet of Things (IoT) named data by information centric networking in IMT-2020. In the Supplement, an enhanced name resolution system is implemented based on distance-constrained containers to resolve from names to addresses more efficiently.

Architectural requirements for cloud storage in video surveillance

This Recommendation defines a cloud storage architecture in visual surveillance. Cloud storage enables the service users to have ubiquitous, convenient and on-demand network access to a shared pool of the configurable storage resources, which can be rapidly provisioned and released with the minimal management effort or service-provider interaction. Cloud storage can realize flexible and reliable data storage for large-scale visual surveillance, and its components are modularized and allocated dynamically based on the real usage. This Recommendation provides the architecture, entities, reference points and service control flow for cloud storage in visual surveillance.