Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Berquist K., Berquist A. — Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems
Berquist K., Berquist A. — Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems

Авторы: Berquist K., Berquist A.

Аннотация:

This monograph constitutes the final report of the EC-sponsored PRISM project, which was devoted to communications management for integrated broadband communications (IBC) within the RACE program. The book introduces and applies the distributed management framework (DMF) developed for the specification and design of multi-domain management systems for controlling, monitoring, and administrating IBC networks. The DMF framework is evaluated in detail and related to other international architectural and specification work aimed at creating advanced communication management systems. Also, a summary of existing platforms potentially supporting PRISM's DMF system, a glossary, a list of acronyms and abreviations, and a detailed subject index are included.


Язык: en

Рубрика: Computer science/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 1996

Количество страниц: 418

Добавлена в каталог: 05.12.2010

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Abstract Information Model description      71
Access control in defining countermeasures      160
Access control in security policy      173
Access control, actors and roles      157
Access control, computational model      187
Access control, definition      137
Access control, description      164
Access control, engineering model      192
Access control, information - definition      164
Access control, information model      182—183
Access control, management service components      168
Access control, scenarios      175—179
Access control, security measures      164
Access control, technologies      196
Access control, UPT service profile management      340
Access control, VPN cost and charging - computational object      284
Access control, VPN cost and charging - requirements capture      231
Access control, with security mechanisms      162
Access control, with Trusted Third Parties - overview      144
Access Decision Function      164
Access Enforcement Function      164
Accountability      44 133
Actions      74
Activity, designing computational activities      80
Activity, designing in UPT service profile management      335
Activity, designing in VPN cost and charging management      275
Activity, UPT service profile management      317
Activity, VPN cost and charging management      219
Actor, definition      56
Actors and Roles description      56
Actors and Roles description, scenario      66
Actors and Roles description, securing management systems      156
Actors and Roles description, UPT service profile management      298
Actors and Roles description, VPN bandwidth management      213
Actors and Roles description, VPN cost and charging management      227
ACTS, description      21
Aggregation, Information viewpoint definition      72
Architecture, Distributed Management Framework (DMF)      27—29
Architecture, relating the DMF to major architectures      355—372 355—372
Architecture, TINA — C      357—361
Association, information viewpoint definition      71
ATM Forum description      21
ATM in VPN bandwidth management      210
Authentication with security mechanisms      161 406
Authentication with Trusted Third Parties - overview      144
Authentication, actors and roles      157
Authentication, applied to DPE      193
Authentication, computational model      185
authentication, definition      137
Authentication, engineering model      190—191
Authentication, in structuring the enterprise      170
Authentication, in the security infrastructure      146
Authentication, information model      179—181
Authentication, management service components      168
Authentication, peer-entity      164
Authentication, requirements      157
Authentication, scenarios      175—179
Authentication, security measures      164
Authentication, technologies      196
Authentication, UPT service profile management      339
Authentication, VPN cost and charging - computational object      284
Automation, relating to security      131
Availability      44
Availability, description      133
Bandwidth management      210—222
Basic Engineering Interface, mapping to computational interfaces      109
Basic Engineering Object access control      192
Basic Engineering Object access control, authentication      190—191
Basic Engineering Object access control, defining communications - description      94
Basic Engineering Object access control, defining communications in VPN cost and charging management      290
Basic Engineering Object access control, definition      92
Basic Engineering Object access control, deploying - description      93
Basic Engineering Object access control, deploying in UPT service profile management      346
Basic Engineering Object access control, deploying VPN cost and charging management      289
Basic Engineering Object access control, deployment method      94
Basic Engineering Object access control, designing communications in UPT service profile management      349
Basic Engineering Object access control, graphical notation      92
Basic Engineering Object access control, ODMA      364
Basic Engineering Object access control, support in platforms      379
Basic Engineering Object access control, UPT service profile management      345
Basic Engineering Object access control, VPN cost and charging management      289
Binder, features      100
Binder, object definition      95
Binder, ODMA support      364
Binder, security and the DPE platform      193
Binder, support in platforms      380
Binding, description      95
Binding, VPN cost and charging management      290
broadband services      4—6
Building Block, comparison to TMN      85
Building Block, definition      39 85
Building Block, design      84
Building Block, design method      86
Building Block, design securing VPN from traffic observation      288
Building Block, design UPT service profile management      343
Building Block, design VPN cost and charging management      280
Building Block, diagram      87
Building Block, mapping to engineering clusters      110
Building Block, support in platforms      379
Business management      32
Capsule in authentication      193
Capsule in modelling transparencies      101
Capsule, definition      93
Capsule, security and the DPE platform      193
Capsule, support in platforms      379
Capsule, UPT service profile management      347
Capsule, VPN cost and charging management      289
Cassiopeia, comparison to DMF      368
Cassiopeia, overview      367
Certification authority description      146
Certification authority description, roles      157
Certification authority description, use in domains      170
Channel      95
Channel, support in platforms      379
Channel, UPT service profile management      349
Channel, VPN cost and charging management      290
Closed systems      35
Cluster      93
Cluster, mapping to engineering clusters      110
Cluster, support in platforms      379
Cluster, UPT service profile management      346
CMIP in an extended platform supporting the DMF      380
CMIP in supporting communications services      375
CMIP, example use with authentication      194
CMIP, supporting modularity and open interfaces      381
CMIP, use in ODMA      364
CMIP, use with security sub-profiles      163
CMIP, used in Quality of Service      125
CMIP, used in the Engineering Viewpoint      90 112
Co-operation, in securing management systems      141
Co-operation, relating to security      130 408
Co-ordination functions      46
Communications with Trusted Third Parties      189
Communications, defining for security with Trusted Third Parties      189
Communications, defining in UPT service profile management      349
Communications, defining in VPN cost and charging management      290
Communications, engineering viewpoint design      94
Communications, support in platforms      375
Community definition      62
Community definition in actors and roles scenario      68
Community definition, UPT service profile management      306
Competition, relating to security      130
Computational activity design access control      187
Computational activity design access control, authentication      185
Computational activity design access control, description      80
Computational activity design access control, securing VPN from traffic observation      286
Computational activity design access control, UPT service profile management      335
Computational activity design access control, VPN cost and charging management      275
Computational Activity Diagram      81
Computational Activity Diagram, graphical notation      81
Computational Contract definition      85
Computational Design Task building block design      84
Computational Design Task building block design, computational object type design      83
Computational Design Task building block design, design activities      80
Computational Design Task building block design, identify computational objects      79
Computational Interface definition      77 85
Computational Interface definition, mapping to engineering interfaces      109
Computational Object definition      39 77
Computational Object definition, graphical notation      80
Computational Object definition, identifying      79
Computational Object definition, mapping to engineering object      109
Computational Object definition, method for identifying      79
Computational Object definition, object type design      83
Computational Object definition, securing management systems      184
Computational Object definition, securing VPN from traffic observation      283
Computational Object definition, support in platforms      379
Computational Object definition, UPT service profile management      334
Computational Object definition, VPN cost and charging management      273
Computational Object Interface support in platforms      379
Computational object type design access control      188
Computational object type design access control, authentication      186
Computational object type design access control, description      83
Computational object type design access control, securing VPN from traffic observation      287
Computational object type design access control, UPT service profile management      338
Computational object type design access control, VPN cost and charging management      279
Computational Object Type Diagrams definition      83
Computational Viewpoint activity diagrams      81
Computational Viewpoint activity diagrams, building block definition      39
Computational Viewpoint activity diagrams, comparison of DMF to Casiopeia      368
Computational Viewpoint activity diagrams, comparison of DMF to ODMA      365
Computational Viewpoint activity diagrams, Computational object definition      39
Computational Viewpoint activity diagrams, conclusion of application to UPT      351
Computational Viewpoint activity diagrams, definition      29
Computational Viewpoint activity diagrams, elaboration      77—89
Computational Viewpoint activity diagrams, introduction      77
Computational Viewpoint activity diagrams, mapping to Engineering viewpoint      108
Computational Viewpoint activity diagrams, mapping to Enterprise viewpoint      106
Computational Viewpoint activity diagrams, mapping to Information viewpoint      107
Computational Viewpoint activity diagrams, ODMA      363
Computational Viewpoint activity diagrams, quality of service      123
Computational Viewpoint activity diagrams, securing management systems      183—189
Computational Viewpoint activity diagrams, support in platforms      379
Computational Viewpoint activity diagrams, UPT service profile management      333
Computational Viewpoint activity diagrams, VPN cost and charging management      273—288
Computer Supported Collaborative Work      207
Confidentiality      44
Confidentiality, applied to DPE      193
Confidentiality, technologies supporting      197
Contract with quality of service      121
Contract, computational support in platforms      379
Contract, computational template      87
Contract, definition      56
Contract, in actors and roles scenario      66
Contract, UPT service profile management      311—315
Contract, use with Trusted Third Parties      144
Convergence functions      46
Core functions      42
correctness      44
Cost and Charging Management      222—291
Countermeasures, defining in the Enterprise Viewpoint      160
Countermeasures, security analysis method      140
Deployment      93
Deregulation      130
Describing Management Services securing management systems      159—169
Describing Management Services securing management systems, UPT service profile management      304
Describing Management Services securing management systems, VPN cost and charging management      235
Detailed Information Model description      75
Distributed Management Framework applying to securing management systems      140—202
Distributed Management Framework applying to securing management systems, applying to UPT      293
Distributed Management Framework applying to securing management systems, applying to VPN      206 205
Distributed Management Framework applying to securing management systems, comparison to Cassiopeia      368
Distributed Management Framework applying to securing management systems, comparison to ODMA      364—367
Distributed Management Framework applying to securing management systems, comparison to OMA      364—367
Distributed Management Framework applying to securing management systems, comparison to TINA — C      361—362
Distributed Management Framework applying to securing management systems, computational viewpoint elaboration      77—89
Distributed Management Framework applying to securing management systems, concepts      31—33
Distributed Management Framework applying to securing management systems, decription      30
Distributed Management Framework applying to securing management systems, design issues      33—47
Distributed Management Framework applying to securing management systems, engineering viewpoint elaboration      89—103
Distributed Management Framework applying to securing management systems, enterpise viewpoint elaboration      53—69
Distributed Management Framework applying to securing management systems, extensions required in platforms      380
Distributed Management Framework applying to securing management systems, external access description      42
Distributed Management Framework applying to securing management systems, information viewpoint elaboration      70—76
Distributed Management Framework applying to securing management systems, introduction      27—29 51
Distributed Management Framework applying to securing management systems, linking the viewpoints      105
Distributed Management Framework applying to securing management systems, platform support      373—382
Distributed Management Framework applying to securing management systems, relating to major architectures      355—372 355—372
Distributed Management Framework applying to securing management systems, scope      27
Distributed Management Framework applying to securing management systems, use of ODP      27
Distributed Management Framework applying to securing management systems, use of telecommunications standards      27
Distributed Management Framework applying to securing management systems, use of TINA — C      27
Distributed Management Framework applying to securing management systems, using to specify management systems      52
Distributed Processing Environment applied to security, engineering viewpoint      193—194
Distributed Processing Environment applied to security, engineering viewpoint in platforms      373
Distributed Processing Environment applied to security, engineering viewpoint in the Engineering viewpoint      97
Distributed Processing Environment applied to security, engineering viewpoint in TINA — C      358 360
Distributed Processing Environment applied to security, engineering viewpoint, modelling access and location transparencies      101
Domain in actors and roles scenario      67
Domain in requirements capture      41
Domain issues      36
Domain, definition      62
Domain, features      37
Domain, management domain definition      62
Domain, ownership      37
Domain, relating ownership, management, security domains      134
Domain, relating to TMN interfaces      135
Domain, securing management systems      170—172
Domain, security - description      134
Domain, support in platforms      375
Domain, UPT service profile management      306
Domain, VPN bandwidth management      212 215
Dynamic Information Model description      73—74
Dynamic Information Model description, UPT service profile management      328—330
Dynamic Information Model description, VPN cost and charging management      246
End user in external access      42
End user in securing management systems      173
Engineering Design Task deploy the BEOs      93
Engineering Model access control      192
Engineering Model access control, authentication      190—91
Engineering Model access control, mapping VPN model to TMN      290
Engineering Model access control, UPT service profile management      344—349
Engineering Model access control, VPN cost and charging management      290
Engineering Object Interface      92
Engineering Object See Basic Engineering Object, mapping to Computational Objects      109
Engineering Viewpoint, applying transparencies to distributed management      97
Engineering Viewpoint, comparison of DMF to Casiopeia      369
Engineering Viewpoint, comparison of DMF to ODMA      366
Engineering Viewpoint, concepts      88
Engineering Viewpoint, conclusion of application to UPT      352
Engineering Viewpoint, definition      29
Engineering Viewpoint, elaboration      89—103
Engineering Viewpoint, introduction      88
Engineering Viewpoint, mapping to Computational viewpoint      108
Engineering Viewpoint, mapping to Enterprise viewpoint      108
Engineering Viewpoint, mapping to Technology viewpoint      112
Engineering Viewpoint, mapping to TMN      111
Engineering Viewpoint, method      90
Engineering Viewpoint, modelling access and location transparencies      101
Engineering Viewpoint, node definition      39
Engineering Viewpoint, ODMA      364
Engineering Viewpoint, quality of service      125
Engineering Viewpoint, securing management systems      189—194
Engineering Viewpoint, support in platforms      379
Engineering Viewpoint, UPT service profile management      344—349
Engineering Viewpoint, VPN Cost and Charging Management      289—291
Enterprise Design Task, describing Management Services      59
Enterprise Design Task, identifying involved parties -description      56
Enterprise Design Task, introduce the environment      55
Enterprise Design Task, requirements capture Process      57
Enterprise Design Task, scenarios      65
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте