[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Security-Requirements: alternatives?



 Hi Gorry,

This issue has been addressed in the security draft.   Some text has
been added to section 5.1 to this effect: 

Basically, in practice there are not many L2 security systems for MPEG 
transmission networks.  Two major examples are:

* Conditional access for digital TV broadcasting is one example that
exists today.  This system is optimised for TV broadcast services only, 
and is not suitable for IP packet transmissions and difficult to
interwork with ULE.

* Some other L2 security systems are specified in standards such the MPE
for DVB system . However, MPE security incomplete and there are no 
known implementations of such security system.

* For DVB-S2 Generic Streams, where IP encapsulation could be similar to
ULE. The authors believe that ULE security format can be used for 
Generic Streams as well.

We would like to ask the ipdvb WG if anybody knows any other existing L2
security systems that might be suitable for ULE.

Haitham
----

Dr. Haitham S. Cruickshank

Lecturer 
Communications Centre for Communication Systems Research (CCSR)
School of Electronics, Computing and Mathematics
University of Surrey, Guildford, Surrey GU2 7XH, UK 

Tel: +44 1483 686007 (indirect 689844) 
Fax: +44 1483 686011
e-mail: H.Cruickshank@surrey.ac.uk
http://www.ee.surrey.ac.uk/Personal/H.Cruickshank/



-----Original Message-----
From: Gorry Fairhurst [mailto:gorry@erg.abdn.ac.uk] 
Sent: 22 June 2006 15:37
To: Cruickshank HS Dr (CCSR); ipdvb@erg.abdn.ac.uk; Iyengar S Mr (CCSR);
P.Pillai@Bradford.ac.uk
Subject: Security-Requirements: alternatives?

Haitham, I-D Authors, List,

One of the issues we need to be clear about in preparing for a WG
adoption of the security requirements I-D is the possible alternatives
that have been proposed/implemented in other standards organisations.

Could you summarise the methods that have been proposed for MPEG-2
transmission networks that provide equivalent L2 security functions, and
say which to your knowledge has actually have been implemented in
systems?

Thanks,

Gorry