23.05.2015 Views

Space Link Extension - Service Management - CCSDS

Space Link Extension - Service Management - CCSDS

Space Link Extension - Service Management - CCSDS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DRAFT RECOMMENDED STANDARD FOR SPACE LINK EXTENSION SERVICE MANAGEMENT<br />

2.4.2.2 Data Privacy (also known as Confidentiality)<br />

Encryption of a message prevents anyone but the intended receiver from being able to read<br />

the message.<br />

2.4.2.3 Data Integrity<br />

Encryption of a message prevents a third party from tampering with the content of a message<br />

in a way that would be undetected by the receiver.<br />

2.4.2.4 Authentication<br />

Signature authentication of a message prevents a third party from masquerading as another<br />

(legitimate) correspondent. Signature authentication is provided by the referenced XML<br />

security standards.<br />

2.4.2.5 Access Control<br />

Access control is inherent in all SLE-SM services, regardless of the concrete transfer syntax<br />

used. The ability to add, update, or view service management information for a given<br />

spaceflight mission is restricted to a specified list of sleSmCreatorNames that are<br />

specified in the <strong>Service</strong> Agreement for that mission. Every SLE-SM message set contains the<br />

sleSmCreatorName of the sender of the message set, and the sleSmCreatorName is<br />

authenticated by the receiver of the message before it is accepted.<br />

In addition, each individual <strong>Service</strong> Package, <strong>Space</strong> <strong>Link</strong> Session Profile, SLS Transfer<br />

<strong>Service</strong> Profile, Retrieval Transfer <strong>Service</strong> Profile, Event Profile, and Trajectory Prediction<br />

has associated with it the sleSmCreatorName of the UM entity that is authorized to<br />

subsequently replace or delete that information entity.<br />

2.4.2.6 Availability of Resources<br />

The SLE-SM services are provided via communication networks that have some limit to the<br />

resources available to support those SLE-SM services. If these resources can be diverted<br />

from their support of the SLE-SM services (in what is commonly known as ‘denial of<br />

service’) then the performance of the SLE-SM services may be curtailed or inhibited.<br />

This SLE-SM Recommended Standard does not define explicit capabilities to prevent denial<br />

of service. Resource availability is expected to be ensured by appropriate capabilities in the<br />

underlying communication service. The specific capabilities will be dependent upon the<br />

technologies used in the underlying communication service and the security environment in<br />

which the UM and CM operate.<br />

<strong>CCSDS</strong> 910.11-R-2 Page 2-15 March 2008

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!