A. appendixA.1. section 1A.1.1. section 2NC3TA-Vol2-v4.xmlNC3TA-Vol2-v4.xmlNC3TA-Vol2-v4.xmlNC3TA-Vol2-v4.xml- -- -- -- -A. APPENDIXA.1. SECTION 1A.1. SECTION 1A.1.1. section 2A.1.1. section 2User domain - persistent security
NCOE CM user, mission applications
•Secure data objects (documents, maps,..)•End-to-end security (request/confirmation dialog)•Encapsulation/sign process (policy enforcement)•Authentication (access control, peer-to-peer)•Personal security environment (SmartCard,..)Management domain
NCOE CM support services
•Security management (PKI, directories)•System management•Network management•Monitoring•Auditing•Intrusion detection•Secure managementCommunication Services domain -
transient security
CM common support application services
•Secure communication services (email, Web,?)•A-Layer proxies (Firewall)•A-Layer Filtering (Virus Checker)•Semantic related filtering•Secure platforms (CORBA,?)Transport domain - transient security
NCOE CM network services
•Transport security services (SSL, SHTTP)•Network security services (VPN, IPSec)•KryptosGeneric security aspects
CM support services, kernel services, APIs, DATA
•Methodology (IHB, ICT set-up process, templates,?)•Risk ' threat assessment•Security policy (certificate policy, certification practise statement, verification policy,..)•Generic krypto services provider (GSS-API, krypto algorithms)•Secure operating systems (file encryption, file access control, local system access control,..)Table A.1. Table Title