欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf

    • 资源ID:704863       资源大小:3.49MB        全文页数:86页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf

    1、ECMA EUROPEAN COMPUTER MAN U FACTURERS ASSOCIATIOR SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK ECMA TR/46 July 1988 Free copies of this document are available from ECMA, European Computer Manufacturers Association 114 Rue du Khne- 1204 Geneva (Switzerland) ECMA EUROPEAN CO YPUTE R MAN U FACTURER S

    2、 ASS OC1 ATIOIQ SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK ECNIA TR/46 July 1988 Brief History ECMA, IS0 and CCITT are working on standards for distributed applications in an Open System environment. Exampla are the OS1 Reference Model, the work on Open Distributed Processing and the Framework fo

    3、r Distributed Office Applications. Security is a major concern in information processing. The security aspects of interconnection have been addressed by IS0 in the work on the OS1 Reference Model (DIS 7498/2, Security Architecture). The purpose of this Technical Report is to provide a Framework for

    4、the development of security provisions in the Application Layer. This Framework unifies many views of security needs and of security functionality including notions about end-systems security and therefore it allows a coherent approach to the specification of protocols and protocol elements as neede

    5、d to realize secure Open Systems. This Report gives an overview of security needs and of the basic functionality needed to answer these needs. Using a generic building block approach it shows how supportive security applications may be constructed to satisfy a wide range of uses. in doing so this Re

    6、port makes extensive use of the concepts developed in ECMA TW42, Framework for Distributed Office Applications as well as in ISO/OSI standards. However, other concepts such as the Object Model of processing used in the work of ECMMC32-TG2 on the Distributed Application Services Environment, may also

    7、 be used to describe the security functions developed in this document. This Report is one of a set of Standards and Reports for Open Systems Interconnection. Open Systems Interconnection standards are intended to facilitate homogeneous interconnection between heterogeneous information processing sy

    8、stems. This Report is within the framework for the coordination of standards for Open Systems Interconnection which is defined by IS0 7498. This Report is based on the practical experience of ECMA member Companies worldwide and on the results of their active participation in the work of IS0 and CCIT

    9、 as well as in national standards bodies in Europe and the USA.lt represents a pragmatic, widely based consensus. This Report emphasises the need for specification of the externally visible and verifiable characteristics needed for the communication of security related information. However, it avoid

    10、s placing unnecessary constraints upon the internal design and implementation of information processing system that process and exchange security related information. This Report is oriented towards urgent and well understood needs and supports rapid and effective standardization. It is intended to

    11、be capable of extensions to cover future developments in technology and needs. Adopted as an ECMA Technical Report by the General Assembly of June 30, 1988. TABLE OF CONTENTS Page 1. INTRODUffION 1 1.1 Need and Application 1.2 Scope of Security in this Report 1.3 The Application Layer Security Frame

    12、work 1.4 References 1.5 Definitions 1 21.1 General Terminology 1.5.2 Specific Terminology 1 S.3 Acronyms 2. REQUIREMENTS 2.1 Requirements on this Report 2.2 Environment Compatibility 2.3 General Security Requirements 2.3.1 User View Of Security 2.3.2 Threats to be addressed 2.3.3 Methods of Attack 2

    13、.4 Security Policies and Domains 2.4.1 Security Policy 2.4.2 Security Administration Domains 2.4.3 Cooperation between Security Domains 2.4.4 Levels of Policy 2.4.5 Implementation of Policies 2.5 Functional Security Requirements 2.5.1 Access Control 2.5.2 Resource Protection 2.5.3 Information Protec

    14、tion 2.5.4 Security Management 2.6 Implementation Considerations 2.6. I 2.6.2 Cryptography 2.7 Design Requirements Use of Supportive Applications 2.7.1 Separation of Functionality 2.7.2 Distributed Operation 2.7.3 RobustnesdResilience 2.7.4 Selective implementation 2.7.5 Usability 2.7.6 Evaluation a

    15、nd Testing 2.7.7 Certification and Accreditation 4 4 7 7 7 8 8 8 9 10 10 10 11 11 12 13 14 14 15 16 17 18 18 19 19 19 19 20 20 20 20 3. SECURITY CONCEPTS AND MODELS 3.1 The Security Domain Concept 3. i .I Introduction 3.1.2 Autonomous Peer Domains 3.1.3 The Security Subdomain 3.1.4 Types of Security

    16、 Domain 3.2 The Security Facility Concept 3.2.1 Introduction 4. DETAILED DESCRIPTION OF SECURITY FACILITIES 4.1 Subject Sponsor 4.1.1 Introduction 4.1.2 Functionality 4.1.3 Interaction With Other Facilities 4.1.4 4.1.5 Use of Other Applications 4.1.6 Facility Management 4.1.7 Interactions with Commu

    17、nications Layer Management Characteristics of the Subject Sponsor 4.2 Authentication Facility 4.2.1 Introduction 4.2.2 4.2.3 Interactions With other Facilities 4.2.4 4.2.5 Use of Other Applications 4.2.6 Facility Management 4.3 Association Management Facility Functions Of the Authentication Facility

    18、 Interactions with Communications Layer Management 4.3.1 Introduction 4.3.2 Functions of Association Management 4.3.3 Interaction With Other Facilities 4.3.4 4.3.5 Interactions With Other Applications 4.3.6 Facility Management Interactions With Communication Layer Management 4.4 Security State Facil

    19、ity 4.4.1 Introduction 4.4.2 4.4.3 Interactions with other Facilities 4.4.4 4.4.5 Use Of Other Applications 4.4.6 Facility Management Functions Of the Security State Facility Interactions with Communication Layer Management 4.5 Security Attribute Management Facility 4.5.1 Introduction 4.5.2 Function

    20、s Of the Facility 4.5.3 Interactions With other Facilities 4.5.4 4.5.5 Use of Other Applications 4.5.6 Facility Management Interactions with Communications Layer Management 20 20 20 21 21 23 25 25 29 29 29 29 30 30 31 31 31 31 31 32 32 33 33 33 34 34 34 35 35 36 36 36 36 36 36 36 37 37 37 37 38 38 3

    21、8 39 39 4.6 Authorization Facility 4.6.1 Introduction 4.6.2 4.6.3 Interactions With other Facilities 4.6.4 4.6.5 Use of Other Applications 4.6.6 Facility Management Functions Of the Authorization Facility Interactions with Communications Layer Management 4.7 Inter-Domain Facility 4.7.1 Introduction

    22、4.7.2 4.7.3 Interactions With other Facilities 4.7.4 4.7.5 Use of Other Applications 4.7.6 Facility Management Functions Of the Inter-Domain Facility Interactions with Communication Layer Management 4.8 Security Audit Facility 4.8.1 Introduction 4.8.2 4.8.3 interactions With other Facilities 4.8.4 4

    23、.8.5 Use of Other Applications 4.8.6 Facility Management Functions Of The Security Audit Facility Interactions with Communications Layer Management 4.9 Security Recovery Facility 4.9.1 Introduction 4.9.2 Functions Of the Facility 4.9.3 Interactions With other Facilities 4.9.4 4.9.5 Use of Other Appl

    24、ications 4.9.6 Facility Management Interactions with Communications Layer Management 4.1 O Cryptographic Support Facility 4. IO. I Introduction 4.10.2 Functions Of The Cryptographic Support Facility 4.10.3 Interactions With other Facilities 4.10.4 Interactions with Communications Layer Management 4.

    25、10.5 Use of Other Applications 4.10.6 Facility Management 4.1 1 Facility Interaction Matrix RELATIONSHIP TO THE OS1 REFERENCE MODEL 5.1 5.2 Single Associates Objects 5.3 Security Application Entity Types 6. SUPPORTIVE SECURITY APPLICATIONS 5. Security Facilities and Application Service Elements 6.1

    26、6.2 Client and Servers Role in The Distributed Environment 6.2. 1 6.2.2 Client/Server Interaction Within a Supportive Security Application Server/Server Interaction within a Supportive Security Application 39 39 40 40 41 41 41 41 41 41 42 43 43 43 43 43 44 45 45 45 45 46 46 46 46 47 47 47 47 47 48 4

    27、8 49 49 49 49 50 50 51 52 53 53 53 53 53 - iv - 6.3 Supportive Security Applications and the OS1 Reference Model 6.4 Supportive Security Application Process Structure 6.5 Service and Management Aspects 7. SECURITY MANAGEMENT 7.1 Operational Security Management 7.1 .I Security Management Functions 7.

    28、 I .2 Security Management Structures 7.1.3 Consistency and Synchronization of Security Management 7.2 Security Configuration Management 7.3 Ordering of Security Management 8. CONCLUSION 54 55 55 56 56 56 58 59 59 60 61 APPENDIX A - DETAILED EXAMPLE OF THE USE OF SECURITY FACILITIES IN ELECTRONICAL M

    29、AIL 63 APPENDIX B - DISCUSSION OF SECURITY ATTRIBUTES 67 APPENDIX C - MANDATORY VERSUS DISCRETIONARY AUTHORIZATION POLICIES 71 -1- 1. INTRODUCTION In recent years, advances in computing and telecommunications technology have greatly expanded the tools available to all users of data processing system

    30、s, irrespective of the field of application. This de- velopment is paralleled by the emergence of facilities for the distributed processing of application tasks, thus giving users great flexibility in the structuring of their systems and in the interaction with other systems. As a consequence, user

    31、organizations are becoming more and more dependent on the services provided by their systems. Increasingly, information of high value, possibly critical to the sur- vival of the organization, is placed on computer systems and exchanged over telecommunications fa- cilities. This trend raises the need

    32、 for dependable systems that process information securely. This Report defines a Framework for the development of standards that support a wide variety of se- curity requirements in a multi-user, multi-vendor systems environment. Major objectives in the devel- opment of such standards are: - to allo

    33、w effective interworking of diverse products - to allow modular, expandable development of products - to facilitate implementation. This report is structured as follows: - Clause 1 (this Clause) gives a general introduction, references and definitions of terms, - Clause 2 gives an overview of securi

    34、ty requirements from both the operational and from the func- tional point of view. It also gives implementation considerations and design requirements relevant to the design of secure systems on the basis of this Framework, - Clauses 3, 4, 5 and 6 describe the Security Framework: the Security Domain

    35、 concept, the Security Facilities concepts, and the mapping of these concepts to other architectures such as the OS1 Refer- ence Model and the Distributed Office Applications Framework, - Clause 7 describes the management aspects of the security functions introduced in the preceding Clauses. - Claus

    36、e 8 gives a summary and conclusions. 1.1 Need and Application Applications may be distributed for various reasons such as sharing of costly resources (e.g a printer) or distributing functionality (e.g. electronic mail services). Standards for Open Systems Interconnection permit the functional compon

    37、ents of applications to be distributed over a network. This must be done in a secure fashion that assures that users can depend on the services provided and the information stored and processed. Generally, security refers to a complex of measures of procedural, logical and physical measures aimed at

    38、 prevention, detection and correction of certain kinds of misuse e.g. together with the tools to install, operate and maintain these measures. For the purpose of this report “security“ will refer to characteristics of data processing systems that give resistance to attack and misuse, intentional or

    39、otherwise. Other aspects of systems security such as reliability, availability and redundancy, are outside the scope of this report. Given the above definition, security addresses not only attacks and threats originating externally, .e. by persons not belonging to the organization operating a given

    40、network or system, it also addresses internal attacks and threats coming from known persons. By providing guarantees of integrity and or confidentiality of information, secure systems may be used to perform business transactions in such a manner as not to expose their users to unacceptable liabiliti

    41、es. Already, major insurance companies are using higher rates for customers with insecure computer systems. -2- Secure systems may more easily survive system failures because the tools and mechanisms needed to assure the integrity of information are available. More and more computers are linked toge

    42、ther in systems that provide a wide variety of services to their users. Such systems are frequently referred to as distributed processing systems because single task may require cooperation between processes executing on several end-systems. This Report pro- vides unifying principles, structuring di

    43、stributed security functions and the associated protocols. This allows a secure environment to be created in which other types of applications may be executed. 1.2 Scope of Security in this Report Many different security needs can be met by a common set of secure functions to be provided out- side a

    44、pplication processes. These functions will affect the interactions between users and productive applications, and between productive applications and supportive applications. They will also affect the installation, maintenance and management of applications and of the underlying system. These functi

    45、ons, their interactions and their management constitute the scope of security in this Report. The level of view addressed in this Report is the level of the “secure environment“.This has close parallels with the concept of Open Distributed Processing. The security requirements of distributed applica

    46、tions that are specific to the nature of these applications (e.g. access controls to the objects owned by a given application) are addressed here only to the extent that generally applicable func- tions and their interactions can be identified. Where appropriate, this Framework refers to Security Se

    47、rvices defined by the OS1 Reference Model as defined in IS0 149812. 1.3 The Application Layer Security Framework This document describes a Security Framework in terms of Application Layer functions necessary to build secure Open Systems. Figure 1 illustrates the concept of a secure, distributed syst

    48、em. To the users and owners, the value represented by computer systems lies mostly in the information residing on these systems and in the application software processing this information. The informa- tion will exist in various forms including files on magnetic media and messages transmitted by ele

    49、c- tronic means. In the figure, this information - the application data - is indicated as “Security Objects“. A secure system protects the application data it processes as well as the application software that performs the processing. it protects information from misuse by users and from misuse by applica- tion software. In the figure, users and active applications are indicated as “Security Subjects“. (A passive application is a Security Object). In the Security Framework, the access of Security Subjects to Security Objects is mediated and con- trolled by Security Facilities. This concept


    注意事项

    本文(ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf)为本站会员(deputyduring120)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开