Авторизация
Поиск по указателям
Berquist K., Berquist A. — Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems
Авторы: Berquist K., Berquist A.
Аннотация: This monograph constitutes the final report of the EC-sponsored PRISM project, which was devoted to communications management for integrated broadband communications (IBC) within the RACE program. The book introduces and applies the distributed management framework (DMF) developed for the specification and design of multi-domain management systems for controlling, monitoring, and administrating IBC networks. The DMF framework is evaluated in detail and related to other international architectural and specification work aimed at creating advanced communication management systems. Also, a summary of existing platforms potentially supporting PRISM's DMF system, a glossary, a list of acronyms and abreviations, and a detailed subject index are included.
Язык:
Рубрика: Computer science /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 1996
Количество страниц: 418
Добавлена в каталог: 05.12.2010
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Abstract Information Model description 71
Access control in defining countermeasures 160
Access control in security policy 173
Access control, actors and roles 157
Access control, computational model 187
Access control, definition 137
Access control, description 164
Access control, engineering model 192
Access control, information - definition 164
Access control, information model 182—183
Access control, management service components 168
Access control, scenarios 175—179
Access control, security measures 164
Access control, technologies 196
Access control, UPT service profile management 340
Access control, VPN cost and charging - computational object 284
Access control, VPN cost and charging - requirements capture 231
Access control, with security mechanisms 162
Access control, with Trusted Third Parties - overview 144
Access Decision Function 164
Access Enforcement Function 164
Accountability 44 133
Actions 74
Activity, designing computational activities 80
Activity, designing in UPT service profile management 335
Activity, designing in VPN cost and charging management 275
Activity, UPT service profile management 317
Activity, VPN cost and charging management 219
Actor, definition 56
Actors and Roles description 56
Actors and Roles description, scenario 66
Actors and Roles description, securing management systems 156
Actors and Roles description, UPT service profile management 298
Actors and Roles description, VPN bandwidth management 213
Actors and Roles description, VPN cost and charging management 227
ACTS, description 21
Aggregation, Information viewpoint definition 72
Architecture, Distributed Management Framework (DMF) 27—29
Architecture, relating the DMF to major architectures 355—372 355—372
Architecture, TINA — C 357—361
Association, information viewpoint definition 71
ATM Forum description 21
ATM in VPN bandwidth management 210
Authentication with security mechanisms 161 406
Authentication with Trusted Third Parties - overview 144
Authentication, actors and roles 157
Authentication, applied to DPE 193
Authentication, computational model 185
authentication, definition 137
Authentication, engineering model 190—191
Authentication, in structuring the enterprise 170
Authentication, in the security infrastructure 146
Authentication, information model 179—181
Authentication, management service components 168
Authentication, peer-entity 164
Authentication, requirements 157
Authentication, scenarios 175—179
Authentication, security measures 164
Authentication, technologies 196
Authentication, UPT service profile management 339
Authentication, VPN cost and charging - computational object 284
Automation, relating to security 131
Availability 44
Availability, description 133
Bandwidth management 210—222
Basic Engineering Interface, mapping to computational interfaces 109
Basic Engineering Object access control 192
Basic Engineering Object access control, authentication 190—191
Basic Engineering Object access control, defining communications - description 94
Basic Engineering Object access control, defining communications in VPN cost and charging management 290
Basic Engineering Object access control, definition 92
Basic Engineering Object access control, deploying - description 93
Basic Engineering Object access control, deploying in UPT service profile management 346
Basic Engineering Object access control, deploying VPN cost and charging management 289
Basic Engineering Object access control, deployment method 94
Basic Engineering Object access control, designing communications in UPT service profile management 349
Basic Engineering Object access control, graphical notation 92
Basic Engineering Object access control, ODMA 364
Basic Engineering Object access control, support in platforms 379
Basic Engineering Object access control, UPT service profile management 345
Basic Engineering Object access control, VPN cost and charging management 289
Binder, features 100
Binder, object definition 95
Binder, ODMA support 364
Binder, security and the DPE platform 193
Binder, support in platforms 380
Binding, description 95
Binding, VPN cost and charging management 290
broadband services 4—6
Building Block, comparison to TMN 85
Building Block, definition 39 85
Building Block, design 84
Building Block, design method 86
Building Block, design securing VPN from traffic observation 288
Building Block, design UPT service profile management 343
Building Block, design VPN cost and charging management 280
Building Block, diagram 87
Building Block, mapping to engineering clusters 110
Building Block, support in platforms 379
Business management 32
Capsule in authentication 193
Capsule in modelling transparencies 101
Capsule, definition 93
Capsule, security and the DPE platform 193
Capsule, support in platforms 379
Capsule, UPT service profile management 347
Capsule, VPN cost and charging management 289
Cassiopeia, comparison to DMF 368
Cassiopeia, overview 367
Certification authority description 146
Certification authority description, roles 157
Certification authority description, use in domains 170
Channel 95
Channel, support in platforms 379
Channel, UPT service profile management 349
Channel, VPN cost and charging management 290
Closed systems 35
Cluster 93
Cluster, mapping to engineering clusters 110
Cluster, support in platforms 379
Cluster, UPT service profile management 346
CMIP in an extended platform supporting the DMF 380
CMIP in supporting communications services 375
CMIP, example use with authentication 194
CMIP, supporting modularity and open interfaces 381
CMIP, use in ODMA 364
CMIP, use with security sub-profiles 163
CMIP, used in Quality of Service 125
CMIP, used in the Engineering Viewpoint 90 112
Co-operation, in securing management systems 141
Co-operation, relating to security 130 408
Co-ordination functions 46
Communications with Trusted Third Parties 189
Communications, defining for security with Trusted Third Parties 189
Communications, defining in UPT service profile management 349
Communications, defining in VPN cost and charging management 290
Communications, engineering viewpoint design 94
Communications, support in platforms 375
Community definition 62
Community definition in actors and roles scenario 68
Community definition, UPT service profile management 306
Competition, relating to security 130
Computational activity design access control 187
Computational activity design access control, authentication 185
Computational activity design access control, description 80
Computational activity design access control, securing VPN from traffic observation 286
Computational activity design access control, UPT service profile management 335
Computational activity design access control, VPN cost and charging management 275
Computational Activity Diagram 81
Computational Activity Diagram, graphical notation 81
Computational Contract definition 85
Computational Design Task building block design 84
Computational Design Task building block design, computational object type design 83
Computational Design Task building block design, design activities 80
Computational Design Task building block design, identify computational objects 79
Computational Interface definition 77 85
Computational Interface definition, mapping to engineering interfaces 109
Computational Object definition 39 77
Computational Object definition, graphical notation 80
Computational Object definition, identifying 79
Computational Object definition, mapping to engineering object 109
Computational Object definition, method for identifying 79
Computational Object definition, object type design 83
Computational Object definition, securing management systems 184
Computational Object definition, securing VPN from traffic observation 283
Computational Object definition, support in platforms 379
Computational Object definition, UPT service profile management 334
Computational Object definition, VPN cost and charging management 273
Computational Object Interface support in platforms 379
Computational object type design access control 188
Computational object type design access control, authentication 186
Computational object type design access control, description 83
Computational object type design access control, securing VPN from traffic observation 287
Computational object type design access control, UPT service profile management 338
Computational object type design access control, VPN cost and charging management 279
Computational Object Type Diagrams definition 83
Computational Viewpoint activity diagrams 81
Computational Viewpoint activity diagrams, building block definition 39
Computational Viewpoint activity diagrams, comparison of DMF to Casiopeia 368
Computational Viewpoint activity diagrams, comparison of DMF to ODMA 365
Computational Viewpoint activity diagrams, Computational object definition 39
Computational Viewpoint activity diagrams, conclusion of application to UPT 351
Computational Viewpoint activity diagrams, definition 29
Computational Viewpoint activity diagrams, elaboration 77—89
Computational Viewpoint activity diagrams, introduction 77
Computational Viewpoint activity diagrams, mapping to Engineering viewpoint 108
Computational Viewpoint activity diagrams, mapping to Enterprise viewpoint 106
Computational Viewpoint activity diagrams, mapping to Information viewpoint 107
Computational Viewpoint activity diagrams, ODMA 363
Computational Viewpoint activity diagrams, quality of service 123
Computational Viewpoint activity diagrams, securing management systems 183—189
Computational Viewpoint activity diagrams, support in platforms 379
Computational Viewpoint activity diagrams, UPT service profile management 333
Computational Viewpoint activity diagrams, VPN cost and charging management 273—288
Computer Supported Collaborative Work 207
Confidentiality 44
Confidentiality, applied to DPE 193
Confidentiality, technologies supporting 197
Contract with quality of service 121
Contract, computational support in platforms 379
Contract, computational template 87
Contract, definition 56
Contract, in actors and roles scenario 66
Contract, UPT service profile management 311—315
Contract, use with Trusted Third Parties 144
Convergence functions 46
Core functions 42
correctness 44
Cost and Charging Management 222—291
Countermeasures, defining in the Enterprise Viewpoint 160
Countermeasures, security analysis method 140
Deployment 93
Deregulation 130
Describing Management Services securing management systems 159—169
Describing Management Services securing management systems, UPT service profile management 304
Describing Management Services securing management systems, VPN cost and charging management 235
Detailed Information Model description 75
Distributed Management Framework applying to securing management systems 140—202
Distributed Management Framework applying to securing management systems, applying to UPT 293
Distributed Management Framework applying to securing management systems, applying to VPN 206 205
Distributed Management Framework applying to securing management systems, comparison to Cassiopeia 368
Distributed Management Framework applying to securing management systems, comparison to ODMA 364—367
Distributed Management Framework applying to securing management systems, comparison to OMA 364—367
Distributed Management Framework applying to securing management systems, comparison to TINA — C 361—362
Distributed Management Framework applying to securing management systems, computational viewpoint elaboration 77—89
Distributed Management Framework applying to securing management systems, concepts 31—33
Distributed Management Framework applying to securing management systems, decription 30
Distributed Management Framework applying to securing management systems, design issues 33—47
Distributed Management Framework applying to securing management systems, engineering viewpoint elaboration 89—103
Distributed Management Framework applying to securing management systems, enterpise viewpoint elaboration 53—69
Distributed Management Framework applying to securing management systems, extensions required in platforms 380
Distributed Management Framework applying to securing management systems, external access description 42
Distributed Management Framework applying to securing management systems, information viewpoint elaboration 70—76
Distributed Management Framework applying to securing management systems, introduction 27—29 51
Distributed Management Framework applying to securing management systems, linking the viewpoints 105
Distributed Management Framework applying to securing management systems, platform support 373—382
Distributed Management Framework applying to securing management systems, relating to major architectures 355—372 355—372
Distributed Management Framework applying to securing management systems, scope 27
Distributed Management Framework applying to securing management systems, use of ODP 27
Distributed Management Framework applying to securing management systems, use of telecommunications standards 27
Distributed Management Framework applying to securing management systems, use of TINA — C 27
Distributed Management Framework applying to securing management systems, using to specify management systems 52
Distributed Processing Environment applied to security, engineering viewpoint 193—194
Distributed Processing Environment applied to security, engineering viewpoint in platforms 373
Distributed Processing Environment applied to security, engineering viewpoint in the Engineering viewpoint 97
Distributed Processing Environment applied to security, engineering viewpoint in TINA — C 358 360
Distributed Processing Environment applied to security, engineering viewpoint, modelling access and location transparencies 101
Domain in actors and roles scenario 67
Domain in requirements capture 41
Domain issues 36
Domain, definition 62
Domain, features 37
Domain, management domain definition 62
Domain, ownership 37
Domain, relating ownership, management, security domains 134
Domain, relating to TMN interfaces 135
Domain, securing management systems 170—172
Domain, security - description 134
Domain, support in platforms 375
Domain, UPT service profile management 306
Domain, VPN bandwidth management 212 215
Dynamic Information Model description 73—74
Dynamic Information Model description, UPT service profile management 328—330
Dynamic Information Model description, VPN cost and charging management 246
End user in external access 42
End user in securing management systems 173
Engineering Design Task deploy the BEOs 93
Engineering Model access control 192
Engineering Model access control, authentication 190—91
Engineering Model access control, mapping VPN model to TMN 290
Engineering Model access control, UPT service profile management 344—349
Engineering Model access control, VPN cost and charging management 290
Engineering Object Interface 92
Engineering Object See Basic Engineering Object, mapping to Computational Objects 109
Engineering Viewpoint, applying transparencies to distributed management 97
Engineering Viewpoint, comparison of DMF to Casiopeia 369
Engineering Viewpoint, comparison of DMF to ODMA 366
Engineering Viewpoint, concepts 88
Engineering Viewpoint, conclusion of application to UPT 352
Engineering Viewpoint, definition 29
Engineering Viewpoint, elaboration 89—103
Engineering Viewpoint, introduction 88
Engineering Viewpoint, mapping to Computational viewpoint 108
Engineering Viewpoint, mapping to Enterprise viewpoint 108
Engineering Viewpoint, mapping to Technology viewpoint 112
Engineering Viewpoint, mapping to TMN 111
Engineering Viewpoint, method 90
Engineering Viewpoint, modelling access and location transparencies 101
Engineering Viewpoint, node definition 39
Engineering Viewpoint, ODMA 364
Engineering Viewpoint, quality of service 125
Engineering Viewpoint, securing management systems 189—194
Engineering Viewpoint, support in platforms 379
Engineering Viewpoint, UPT service profile management 344—349
Engineering Viewpoint, VPN Cost and Charging Management 289—291
Enterprise Design Task, describing Management Services 59
Enterprise Design Task, identifying involved parties -description 56
Enterprise Design Task, introduce the environment 55
Enterprise Design Task, requirements capture Process 57
Enterprise Design Task, scenarios 65
Реклама