Tech-invite3GPP-SpecsFeaturesEntitiesInterfacesSBIsIdentifiersTi+Search in Tech-invite

full Table of Contents for  TR 33.880  Word version:   15.1.0

 

Top   Up   Prev   Next
1…   5.3…   7…   7.3…   7.5…   7.6…   8…   A…

 

 

7  Potential security solutions
7.1  General
7.2  Cross-service security solutions
7.2.1  Solution #1.1 : KMS Discovery and redirection
7.2.2  Solution #1.2 : Distribution of key material to protect signalling between the MCX Server and the MCX clientWord-p. 48
7.2.3  Solution #1.3 : Adding KMS security domain details to configuration dataWord-p. 52
7.2.4  Solution #1.4 : Encryption of entire XML signalling content
7.2.5  Solution #1.5 : Signalling ProxyUp
7.2.6  Solution #1.6 : Authentication of a sensitive signalling request (EAR)Up
7.2.7  Solution #1.7 : EAR authorisationUp

Up   Top   ToC