Skip to main content
European Commission logo print header

Secure Network Architecture Project

Ziel

This project addresses the control of the relationships between users, applications and services by means of establishing a consistent architectural framework. This framework, consisting of a set of formally defined security services, facilities and protocols, is firmly based on the work of ECMA TC32/TG9. In addition, recent parallel work by industry groups is taken fully into account. The needs for portability and interoperability, and the need to provide a route forward overcoming identified limitations, are contained within the major objectives of the project.
The overall objective of the research was to help to bring about generally available, effective and usable protection of information processing and communication systems, together with the control and protection of the processes that use, handle, transmit and manage the infirmation in an integrated broadband communications (IBC) environment. The need for such protection is well established in the light of the increasing trust placed on electronic information for personal and private, commercial and economic and governmental and administrative use.

Given this general requirement for protection of information and services, the key issue in the ability to deliver to the user efficient and effective solutions which balance security needs with on going operational cost effectiveness. These solutions should be applicable to all aspects of IBC including applications, services and infrastructure management.

The research aims to develop and deliver a set ofhigh quality software components, forming the elements of a secure network architecture. Recognising the need for assurable products and systems, these components must be engineered to a very high standard. Application programming interfaces, to provide ease of use and portability also have to be developed and standardized.

During 1992 the functional requirements, system specification and system design were produced. These are under formal change control and will provide the basis for the subsequent activities in detail design and implementation. An end user group has been established.
Technical Approach

The project is developing and delivering a set of high quality software components, forming the elements of the architecture. Recognising the need for assurable products and systems, these components are being engineered to a very high standard, targeted at ITSEC E3 level. Application Programming Interfaces, to provide ease of use and portability, are being developed and standardised.

The project has involved a user-group in the requirements specification, integration and evaluation activities, to ensure the validity and practicability of the results. Users will also provide visibility and feedback within their respective fields of operation, during the third year.

A wide range of user population sizes and spectrum of security policies will be covered. Requirements for administrative aspects of systems and networks are seen as the greatest challenge, from considerations of both the necessary levels of trust and the extents of the populations served.

The core of the project is the integration work package, which delivers the quality components and provides demonstration capabilities. This is supported by work packages covering the development of the architecture, investigation and specification of requirements and functionality, overall technical and quality process specification, and module implementation and test.

Results are being delivered to the partners for validation in real-world environments, and for potential subsequent incorporation into products and systems. Results have been made available for use more widely in RACE and other RTD programmes.

Key Issues

The overall objective of the project is to help to bring about generally available, effective and usable protection of information in distributed information processing and communication systems, together with the control and protection of the processes that use, handle, transmit and manage the information in an IBC environment. The need for such protection is well established in the light of the increasing trust placed on electronic information for the conduct of affairs - personal and private, commercial and economic, governmental and administrative.

Given this general requirement for protection of information and services, the key issue is the ability to deliver to the user efficient and effective solutions which balance security needs with on-going operational cost-effectiveness. These solutions will be applicable to all aspects of IBC: applications, services and infrastructure management.

Expected Impact

It is a strategic objective that the results of the project should have a major influence and take-up. The project is working with the major groupings establishing industry standards, in addition to participating in concerted contributions to the European and International Standards for security. An extension to the work of this project has been agreed for 1995.

Thema/Themen

Data not available

Aufforderung zur Vorschlagseinreichung

Data not available

Finanzierungsplan

Data not available

Koordinator

BULL SA
EU-Beitrag
Keine Daten
Adresse
68 ROUTE DE VERSAILLES
78430 LOUVECIENNES
Frankreich

Auf der Karte ansehen

Gesamtkosten
Keine Daten

Beteiligte (2)