欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T X 802-1995 Information Technology - Lower Layers Security Model - Data Networks and Open System Communications - Security 22 pp《信息技术-低层安全模式-数据网络和开放系统通信-安全 22页》.pdf

    • 资源ID:805746       资源大小:1,018.12KB        全文页数:22页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T X 802-1995 Information Technology - Lower Layers Security Model - Data Networks and Open System Communications - Security 22 pp《信息技术-低层安全模式-数据网络和开放系统通信-安全 22页》.pdf

    1、 ITU-T RECMN*X-8OZ 75 m- 4862593 Ob03535 942 INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS SECURITY X.802 (04/95) INFORMATION TECHNOLOGY - LOWER LAYERS SECURITY MODEL ITU-T Recommendation X.802 (Previously “CC

    2、ITT Recommendation”) Foreword ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. Some 179 member countries, 84 telecom operating entities, 1

    3、45 scientific and industrial organizations and 38 international organizations participate in ITU-T which is the body which sets world telecommunications standards (Recommendations). The approval of Recommendations by the Members of ITU-T is covered by the procedure laid down in WTSC Resolution No. 1

    4、 (Helsinki, 1993). In addition, the World Telecommunication Standardization Conference (WTSC), which meets every four years, approves Recommendations submitted to it and establishes the study programme for the following period. In some areas of information technology which fall within ITU-Ts purview

    5、, the necessary standards are prepared on a collaborative basis with IS0 and IEC. The text of ITU-T Recommendation X.802 was approved on 10th of April 1995. The identical text is also published as ISOAEC International Standard 13594. NOTE In this Recommendation, the expression “Administration” is us

    6、ed for conciseness to indicate both a telecommunication administration and a recognized operating agency. O ITU 1995 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without per

    7、mission in writing from the ITU. ITU-T RECflN*X-802 95 = 4862593 0603537 715 Services and Facilities Interfaces ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS (February 1994) ORGANIZATION OF X-SERIES RECOMMENDATIONS X.l-X. 19 X.20-X.49 I Subiect area I Recommendation Ser

    8、ies I Transmission, Signalling and Switching Network Asvects I PUBLIC DATA NETWORKS I I X.50-X.89 X.90-X. 149 Administrative Arrangements OPEN SYSTEMS INTERCONNECTION X.180-X.199 I Maintenance I X. 150-X.179 I Model and Notation Service Definitions X.200-X.209 X.210-X.219 Connectionless-mode Protoco

    9、l Specifications PICS Proformas I Connection-mode Protocol Specifications I X.220-X.229 I X.230-X.239 X.240-X.259 Security Protocols Layer Managed Objects I Protocol Identification I X.260-X.269 I X.270-X.25 X.280-X.289 Conformance Testing INTERWORKING BETWEEN NETWORKS X.290-X.299 I General I X.300-

    10、X.349 I Mobile Data Transmission Systems Management X.350-X.369 X.370-X.399 I MESSAGE HANDLING SYSTEMS I X.400-X.499 I DIRECTORY OS1 NETWORKING AND SYSTEM ASPECTS X.500-X.599 Networking Naming, Addressing and Registration I Abstract Syntax Notation One (ASN. 1) I X.680-X.699 I X.600-X.649 X.650-X.67

    11、9 OS1 MANAGEMENT SECURITY I OS1 APPLICATIONS I I X.700-X.799 X.800-X.849 Commitment, Concurrency and Recovery Transaction Processing I Remote Operations I X.880-X.899 I X.850-X.859 X.860-X.879 _ OPEN DISTRZBUTED PROCESSING X.900-X.999 ITU-T RECMN*X.802 95 = 4862591 KI603538 b51 1 2 3 4 5 6 7 8 9 10

    12、11 12 13 14 15 16 17 18 19 CONTENTS Scope References 2.1 Identical Recommendations I International Standards 2.2 Paired Recommendations I International Standards equivalent in technical content 2.3 Additional references Definitions. . 3.1 OS1 Reference Model definitions . 3.2 Open System Security Fr

    13、ameworks definitions 3.3 Internal Organization of the Network Layer definitions . 3.4 Additional definitions . Abbreviations . Security associations 5.1 General overview 5.2 Establishing a security association for the lower layers 5.3 Security association close . 5.4 Modification of attributes in a

    14、connection Influence on existing protocols 6.2 Connectionless SDU size 6.3 Concatenation of PDUs . 6.4 Algorithm and mechanism independence . 6.1 General principle . Common security PDU structure . Determination of security services and mechanisms Protection QOS Security rules Placement of security

    15、in the lower layers . Use of (N-1)-layer(s) to enhance (N)-layer security Security labelling . Security of routeing 16.1 Security policy 16.2 Security association management . Security domains Security Management . 16.3 Key management 16.4 Security Audit . Traffic flow confidentiality Guidelines for

    16、 the definition of SA-Attributes . Error handling Annex A . Illustrative example of an Agreed Set of Security Rules ITU-T Rec . X.802 (1995 E) Page 1 1 1 2 2 2 2 3 3 3 3 3 3 5 6 6 6 6 6 6 6 7 7 7 7 7 13 13 13 13 14 14 14 14 14 14 15 15 16 1 ITU-T RECMN*Xm802 95 4Ab259L Ob03539 598 Summary This Recom

    17、mendation I International Standard describes the cross layer aspects of the revision of security services in the lower layers of the OS1 Reference Model (Transport, Network, Data Link, Physical). It describes the architectural concepts common to these layers, the basis for interactions relating to s

    18、ecurity between layers and the placement of security protocols in the lower layers. 11 ITU-T Rec. X.802 (1995 E) - ITU-T RECMNxX.802 95 48b259L Ob03540 2OT ISO/IEC TR 13594 : 1995 (E) TECHNICAL REPORT ITU-T RECOMMENDATION INFORMATION TECHNOLOGY - LOWER LAYERS SECURITY MODEL 1 Scope This Recommendati

    19、on I Technical Report describes the cross layer aspects of the provision of security services in the lower layers of the OS1 Reference Model (Transport, Network, Data Link and Physical layers). This Recommendation I Technical Report describes: a) architectural concepts common to the lower layers bas

    20、ed on those defined in CCITT Rec. X.800 I the basis for interactions relating to security between protocols in the lower layers; the basis for any interactions relating to security between the lower layers and upper layers of OSI; the placement of security protocols in relation to other lower layer

    21、security protocols and the relative role of such placements. IS0 7498-2; b) c) d) There should be no conflict between the security protocols for the lower layers and the model described in this Recommendation I Technical Report. CCITT Rec. X.500 I ISO/IEC 9594-1 identifies the security services rele

    22、vant to each of the lower layers of the OS1 Reference Model. 2 References The following Recommendations and International Standards contain provisions which, through reference in this text, constitute provisions of this Recommendation I Technical Report. At time of publication, the editions indicate

    23、d were valid. All Recommendations and Standards are subject to revision, and parties to agreements based on this Recommendation I Technical Report are encouraged to investigate the possibility of applying the most recent edition of the Recommendations and Standards listed below. Members of IEC and I

    24、S0 maintain registers of currently valid International Standards. The Telecommunication Standardization Bureau of the ITU maintains a list of currently valid ITU-T Recommendations. Identical Recommendations I International Standards - ITU-T Recommendation X.200 (1994) I ISO/IEC 7498-1:1994, Infomzat

    25、ion technology - Open Systems Interconnection - Basic Reference Model: The Basic Model. ITU-T Recommendation X.233 (1993) I ISO/IEC 8473-1 : 1994, Information technology - Protocol for providing the OSI connectionless-mode Network service: Protocol specification. ITU-T Recommendation X.234 (1994) I

    26、ISO/IEC 8602: 1995, Information technology - Protocol for providing the OSI connectionless-mode Transport service. ITU-T Recommendation X.273 (1994) I ISO/IEC 11577:1995, Infomution technology - Open Systems Interconnection - Network layer security protocol. ITU-T Recommendation X.274 (1994) I ISO/I

    27、EC 10736: 1995, Information technology - Open Systems Interconnection - Transport layer securiQ protocol. ITU-T Recommendation X.803 (1994) I ISO/IEC 10745:1995, Information technology - Open Systems Interconnection - Upper layers security model. - - - - - ITU-T Rec. X.802 (1995 E) 1 ITU-T RECNN*X*8

    28、02 95 4862593 0603.543 L4b = ISO/IEC TR 13594 : 1995 (E) - IT-T Recommendation X.810) I ISOAEC 10181-1 .), Information technology - Open Systems Interconnection - Security frameworks in open systems: Securityframeworks overview. ITU-T Recommendation X.812l) I ISOAEC 10181-3 .), Information technolog

    29、y - Open Systems Interconnection - Security frameworks in open systems: Access control framework. - 2.2 Paired Recommendations I International Standards equivalent in technical content - CCITT Recommendation X.800 (1991), Security architecture for Open Systems Interconnection for CCIT applications.

    30、IS0 7498-2: 1989, Information processing system - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture. ITU-T Recommendation X.224 (1993), Protocol for providing the OS1 connection-mode transport service. ISOAEC 8073: 1992, Informution technology - Telecommunications

    31、and information exchange between systems - Open Systems Interconnection - Protocol for providing the connection-mode Transport service. CCIT Recommendation X.208 (1988), Specification of Abstract Syntax Notation One (ASN.I). ISOAEC 8824: 1990, Information technology - Open Systems Interconnection -

    32、Specification of Abstract Syntax Notation One (ASN.l). CCIT Recommendation X.209 (1988), Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.l). ISO/IEC 8825: 1990, Information technology - Open Systems Interconnection - Specification of Basic Encoding Rules for Abstract Synt

    33、ax Notation One (ASN.1). - - - 2.3 Additional references - ISOAEC 8208:1995, Information technology - Data communications - X.25 Packet Layer Protocol For Data Terminal Equipment. ITU-T Recommendation X.25 (1993), Interface between Data Terminal Equipment (DTE) and Data Circuit-Terminating Equipment

    34、 (DCE) for terminals operating in packet mode and connected to public datu networks by dedicated circuits. IS0 8648: 1988, Information processing systems - Open Systems Interconnection - Internal organization of the Network Layer. IS0 9542: 198S2), Information processing systems - Telecommunications

    35、 and information exchange between systems - End system to intemediate system routeing exchange protocol for use in conjunction with the Protocol routeing for providing the connectionless-mode network service (IS0 8473). ISO/IEC 10589: 1992, Information technology - Telecommunications and information

    36、 exchange between systems - Intermediate system to intermediate system intra-domain-routeing routine information exchange protocol for use in conjunction with the protocol for providing the connectionless-rnode Network service (IS0 8473). ISOIIEC 10141: 1994, Information technology - Telecommunicati

    37、ons and information exchange between systems - Protocol for exchange of inter-domain routeing information among intermediate systems to support forwarding of IS0 8473 PDUs. - - - - - 3 Definitions 3.1 OS1 Reference Model definitions This Recommendation I Technical Report makes use of the following t

    38、erms as defined in ITU-T Rec. X.200 I ISOAEC 7498- 1 - Quality of Service I) Presently at the stage of draft. 2, Currently under revision. 2 ITU-T Rec. X.802 (1995 E) ITU-T RECNN*X*802 95 W 4862571 Ob03542 082 = ISO/IEC TR 13594 : 1995 (E) 3.2 This Recommendation I Technical Report makes use of the

    39、following terms as defined in ITU-T Rec. X.810 I Open System Security Frameworks definitions ISOAEC 10181-1: - security domain 3.3 This Recommendation I Technical Report makes use of the following terms as defined in IS0 8648: Internal Organization of the Network Layer definitions a) subnetwork acce

    40、ss protocol; b) end system; c) intermediate system. 3.4 Additional definitions For the purposes of this Recommendation I Technical Report, the following definitions apply: 3.4.1 originator. 3.4.2 security association attributes: The collection of information required to control the security of commu

    41、nications between an entity and its remote peer(s). 3.4.3 corresponding security association attributes. 3.4.4 mechanisms to be employed, including all parameters needed for the operation of the mechanism. (IT-T Rec. X.803 I ISO/EC 10745). reflection protection: A protection mechanism to detect when

    42、 a protocol data unit has been sent back to the security association: The relationship between lower layer communicating entities for which there exists security niles: Local information which, given the security services selected specify the underlying security NOTE - Security rules are a form of s

    43、ecure interaction rules as defined in the Upper Layers Security Model 4 Abbreviations ISN Integrity Sequence Number SSAA Set of SA-Attributes NLSP Network Layer Security Protocol NLSP-CO NLSP Connection mode NLSP-CL NLSP Connectionless mode QOS SA Security Association SA-ID Security Association Iden

    44、tifier SNAcP SMSP Subnetwork Independent Security Protocol TLSP Transport Layer Security Protocol Quality of Service (as defined in CCITT Rec. X.200 I ISOAEC 7498-1) Subnetwork Access Protocol (as defined in IS0 8648) 5 Security associations 5.1 General overview 5.1.1 Any security protocol makes use

    45、 of a number of security mechanisms to provide security services to the layer above. The security services required by the higher layer may be indicated to the lower layers through use of local security management functions. The security protocol and each of its security mechanisms require informati

    46、on, in addition to that which is encoded in the PDUs, to enable secure communication. Examples of such additional ITU-T Rec. X.802 (1995 E) 3 ISO/IEC TR 13594 : 1995 (E) information are the specification of the mechanisms to be used by the protocol and, for each mechanism, specific information such

    47、as the key required by an encipherment mechanism. Each piece of additional information is known as a Security Association Attribute. 5.1.2 examples of placement mechanisms are: Security Association Attributes may be placed in a protocol entity using a number of mechanisms. Some a) b) c) d) e) f) 5.1

    48、.3 SA-Attributes may be placed at any time prior to the communication to which they relate. When compatible Sets of SA-Attributes (SSAA) are in place in each protocol entity, a Security Association is said to exist between the protocol entities. 5.1.4 SSAAs (and Security Associations) may exist with

    49、 different granularity. Sometimes it is useful to be able to refer to SSAAs with different granularity. For instance, the SSAA defined by an Agreed Set of Security Rules (ASSR) could be denoted by SSAA ASSR. Or a pairwise key may be established between two protocol entities for use over a number of instances of common Source-Destination Address Pair. Similarly the SSAA for an instance of communication could be referred to by SSAA-Instance of Communication. Likewise the SSAA for a connection oriented PDU could be referred to by SSAA CO PDU. 5.1.5 In


    注意事项

    本文(ITU-T X 802-1995 Information Technology - Lower Layers Security Model - Data Networks and Open System Communications - Security 22 pp《信息技术-低层安全模式-数据网络和开放系统通信-安全 22页》.pdf)为本站会员(刘芸)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开