欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T X 800-1991 Security Architecture for Open Systems Interconnection for CCITT Applications (Study Group VII) 49 pp《CCIT开放网络互连安全结构研究组7 49pp》.pdf

    • 资源ID:805743       资源大小:2.75MB        全文页数:49页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T X 800-1991 Security Architecture for Open Systems Interconnection for CCITT Applications (Study Group VII) 49 pp《CCIT开放网络互连安全结构研究组7 49pp》.pdf

    1、INTERNATIONAL TELECOMMUNICATION UNION CCITT X.800 THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMM ITTEE DATA COMMUNICATION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS SECURITY ARCHITECTURE FOR OPEN SYSTEMS INTERCONNECTION FOR CCITT APPLICATIONS Reco

    2、mmendation X.800 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesCCITT RECMN*X=8OQ 91 m 4862593 0563723 8 m INTERNATIONAL TELECOMMUNICATION UNION CCITT THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONS U LTATIVE COM M ITTE E DATA COMMUNICA

    3、TION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS SECURITY ARCHITECTURE FOR OPEN SYSTEMS INTERCONNECTION FOR CCITT APPLICATIONS Recommendation X.800 I Geneva, 1991 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Han

    4、dling ServicesCCITT RECMN*X=BOO 91 4862593 05b3724T- FOREWORD The CCJIT (the International Telegraph and Telephone Consultative Committee) is a permanent organ of the International Telecommunication Union (ITU). CC is responsible for studying technical, operating and tariff questions and issuing Rec

    5、ommendations on them with a view to standardizing telecommunications on a worldwide basis. The Plenary Assembly of CC which meets every four years, establishes the topics for study and approves Recommendations prepared by its Study Groups. The approval of Recommendations by the members of CCIT betwe

    6、en Plenary Assemblies is covered by the procedure laid down in CCIIT Resolution No. 2 (Melbourne, 1988). Recommendation X.800 was prepared by Study Group VI1 and was approved under the Resolution No. 2 procedure on the 22nd of March 1991. CCIIT NOTE In this Recommendation, the expression “Administra

    7、tion” is used for conciseness to indicate both a telecommunication Administration and a recognized private operating agency. o ITU 1991 All rights reserved. No part of ihis-publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and mic

    8、rofilm, without permission in writing from the ITU. COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesRecommendation X.800 SECURITY ARCHITECTRE FOR OPEN SYSTEMS INTERCONNECIION FOR CCITT APPLICATIONS O Introduction Recommendation X.200 de

    9、scribes the Reference Model for open systems interconnection (OSI). It establishes a framework for coordinating the development of existing and future Recommendations for the interconnection of systems. The objective of OS1 is to permit the interconnection of heterogeneous computer systems so that u

    10、seful communication between application processes may be achieved. At various times, security controls must be established in order to protect the information exchanged between the application processes. Such controls should make the cost of improperly obtaining or modifying data greater than the po

    11、tential value of so doing, or make the time required to obtain the data improperly so great that the value of the data is lost. This Recommendation defines the general security-related architectural elements which can be applied appropriately in the circumstances for which protection of communicatio

    12、n between open systems is required. It establishes, within the framework of the Reference Model, guidelines and consraints to improve existing Recornmendations or to develop new Recommendations in the context of OS1 in order to allow secure communications and thus provide a consistent approach to se

    13、curity in OSI. A background in security will be helpful in understanding this Recommendation. The reader who is not well versed in security is advised to read Annex A first. This Recommendation extends the Reference Model (Recommendation X.200) to cover security aspects which are general architectur

    14、ai elements of communications protocols, but which are not discussed in the Reference Model. 1 Scope aud field of application This Recommendation: a) b) This Recommendation extends the field of application of Recommendation X.200, to cover secure communications between open systems. Basic security s

    15、ervices and mechanisms and their appropriate placement have been identified for all layers of the Reference Model. In addition, the architecturai relationships of the security services and mechanisms to the Reference Model have been identified. Additional security measures may be needed in end syste

    16、ms, installations and organizations. These measures apply in various application contexts. The definition of security services need4 to support such additional security measures is outside the scope of the Recornmendation. provides a general description of security services and related mechanisms, w

    17、hich may be provided by the Reference Model; and defines the positions within the Reference Model where the services and mechanisms may be provided. 1 Recommendation X.800 and IS0 7498-2 (Information processing systems - Open systems interconnection - Basic Reference Made1 -Part 2: Security architec

    18、ture) are technically aligned. Recommendation X.800 1 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling Services-CCITT RECMN%X=800 71 m 4862593 05b3726 3 m OS1 security functions are concerned only with those visible aspects of a communications p

    19、ath which permit end systems to achieve the secure transfer of information between them. OS1 security is not concerned with security measures needed in end systems, installations, and organizations, except where these have implications on the choice and position of security services visible in OSI.

    20、These latter aspects of security may be standardized but not within the scope of OS1 Recommendations. This Recommendation adds to the concepts and principles defined in Recommendation X.200; it does not modify them. It is not an implementation specification, nor is it a basis for appraising the conf

    21、ormance of actual implementations. 2 References Rec. X.200 -Reference Model of open systems interconnection for CCIT applications. IS0 7498 - Information processing systems - Open systems interconnection - Basic Reference Model (1984). IS0 7498-4 - Information processing systems - Open systems inter

    22、connection - Basic Reference Model - Part 4: Management framework (1989). IS0 7498/AD1- Information processing systems -Open systems interconnection - Basic Reference Model - Addendum 1: Connectionless-mode transmission (1987). IS0 8648 - Information processing systems - Open systems interconnection

    23、 - Internal organization of the network layer (1988). 3 Definitions and abbreviations 3.1 following terms defined in it: This Recommendation builds on concepts developed in Recommendation X.200 and makes use of the a) (N)-connection; b) (N)-data-transmission; c) 0-entity; d) 0-facility; e) 0-layer;

    24、f) Open system; g) Peer entities; h) 0-protocol; j) 0-protocol-data-unit; k) Orelay; 1) Routing; m) Sequencing; n) (N)-service; p) (N)-semice-daia-unit; q) (N)-user-data; r) Sub-network; s) OS1 resource; and t) Transfer syntax. 2 Recommendation X.800 COPYRIGHT International Telecommunications Union/

    25、ITU TelecommunicationsLicensed by Information Handling Services3.2 standards: This Recommendation uses the foilowing terms drawn from the respective Recommendations/Intemational Connectionless-mode transmission (IS0 7498/AD 1) End system (Rec. X.20O/ISO 7498) Relaying and routing function (IS0 8648)

    26、 Management information base (MIB) (IS0 74984) In addition, the following abbreviations are used. OS1 open systems interconnection; SDU for service data unit; SMiB for security management information base; and MIB for management information base. 3.3 For the purpose of this Recommendation, the follo

    27、wing definitions apply: 3.3.1 access control The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner. 3.3.2 access control iist A list of entities, together with their access rights, which are authorized to have access to a resource.

    28、3.3.3 accountability The property that ensures that the actions of an entity may be traced uniquely to the entity. 3.3.4 active threat The threat of a deliberate unauthorized change to the state of the system. Note - Examples of security-relevant active threats may be: modification of messages, repl

    29、ay of messages, insertion of spurious messages, masquerading as an authorized entity and denial of service. 3.3.5 audit See security audit. 3.3.6 audit trail See security audit trail. 3.3.7 authentication See data origin authentication, and peer entity authentication. Note - In this Recommendation t

    30、he term “authentication” is not used in connection with data integrity; the term “data integrity” is used instead. 3.3.8 authen tication information Information used to establish the validity of a claimed identity. 3.3.9 authentication exchange A mechanism intended to ensure the identity of an entit

    31、y by means of information exchange. Recommendation X.800 3 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesCCITT RECflN*X.BOO 91 4862571 05b3728 7 3.3.10 authorization The granting of rights, which includes the granting of access based

    32、on access rights. 3.3.1 1 availability The property of being accessible and useable upon demand by an authorized entity. 3.3.12 capability A token used as an identifier for a resource such that possession of the token confers access rights for the resource. 3.3.13 channel An information transfer pat

    33、h. 3.3.14 ciphertext Data produced through the use of encipherment. The semantic content of the resulting data is not available. Note - Ciphertext may itself be input to encipherment, such that super-enciphered output is produced. 3.3.15 cleartext Intelligible data, the semantic content of which is

    34、available. 3.3.16 confidentiality The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. 3.3.17 credentials Data that is transferred to establish the claimed identity of an entity. 3.3.18 cryptanalysis sensitive data including cleartext.

    35、 The analysis of a cryptographic system and/or its inputs and outputs to derive confidential variables and/or 3.3.19 cryptographic checkvalue unit. Information which is derived by performing a cryptographic transformation (see cryptography) on the data Note - The derivation of the checkvalue may be

    36、performed in one or more steps and is a result of a mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit. 3.3.20 cryptography its information content, prevent its undetected modification and/or prevent its unauthorized us. The discipline which em

    37、bodies principles, means, and methods for the transformation of data in order to hide Note - Cryptography determines the methods used in encipherment and decipherment. An attack on a cryptographic principle, means, or method is cryptanalysis. 3.3.21 data integrity The property that data has not been

    38、 altered or destroyed in an unauthorized manner. 3.3.22 data orwn authentication The corroboration that the source of data received is as claimed. 4 Recommendation X.800 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling Services3.3.23 deciphermen

    39、t The reversal of a corresponding reversible encipherment. 3.3.24 decryption See decipherment. 3.3.25 denial of service The prevention of authorized access to resources or the delaying of time-critical operations. 3.3.26 digital signature of the data unit to prove the source and integrity of the dat

    40、a unit and protect against forgery e.g. by the recipient. 3.3.27 encipherment Data appended to, or a cryptographic transformation (see cryptography) of a data unit that allows a recipient The cryptographic transformation of data (see cryptography) to produce ciphertext. Note - Encipherment may be ir

    41、reversible, in which case the corresponding decipherment process cannot feasibly be performed. 3.3.28 encryption See encipherment. 3.3.29 end-to-end encipherment only within or at the destinaiion end system. (See also link-by-link encipherment.) 3.3.30 identity-based security policy Encipherment of

    42、data within or at the source end system, with the corresponding decipherment occurring A security policy based on the identities and/or attributes of users, a group of users, or entities acting on behalf of the users and the resources/objects being accessed. 3.3.31 integrity See data integrity. 3.3.

    43、32 key A sequence of symbols that controls the operations of encipherment and decipherment. 3.3.33 key management The generation, storage, distribution, deletion, archiving and application of keys in accordance With a security policy. 3.3.34 link-by-link encipherment The individual application of en

    44、cipherment to data on each link of a communications system, (See also end- Note -The implication of link-by-link encipherment is that data will be in cleartext form in relay entities. to-end encipherment.) 3.3.35 manipulation detection A mechanism which is used to detect whether a data unit has been

    45、 modified (either accidentally or intentionally). 3.3.36 masquerade The pretence by an entity to be a different entity. Recommendation X.800 5 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesCCITT RECMN*X.BOO 71 4862593 05637305 3.3.37

    46、notarization The registration of data with a trusted third party that allows the later assurance of the accuracy of its characteristics such as content, origin, time and delivery. 3.3.38 passive threat The threat of unauthorized disclosure of information without changing the state of the system. 3.3

    47、.39 password Confidential authentication information, usually composed of a smng of characters. 3.3.40 peer-entity authentication The corroboration that a peer entity in an association is the one claimed. 3.3.41 physical security The measures used to provide physical protection of resources against

    48、deliberate and accidental threats. 3.3.42 policy See security policy. 3.3.43 privacy The right of individuals to control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed. Note - Because this term relates to the right

    49、of individuals, it cannot be very precise and its use should be avoided except as a motivation for reqiring security. 3.3.44 repudiation Denial by one of the entities involved in a communication of having participated in all or pata of the communication. 3.3.45 routing control The application of rules during the process of routing so as to chose or avoid specific networks, links or relays. 3.3.46 rule-based security policy A security policy based on global rules imposed for all users. These rules usually rely on a comparison of the sensitivity of the resources being accessed a


    注意事项

    本文(ITU-T X 800-1991 Security Architecture for Open Systems Interconnection for CCITT Applications (Study Group VII) 49 pp《CCIT开放网络互连安全结构研究组7 49pp》.pdf)为本站会员(王申宇)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开