CAN CSA-ISO IEC 10745-1996 Information Technology - Open Systems Interconnection - Upper Layers Security Model.pdf
《CAN CSA-ISO IEC 10745-1996 Information Technology - Open Systems Interconnection - Upper Layers Security Model.pdf》由会员分享,可在线阅读,更多相关《CAN CSA-ISO IEC 10745-1996 Information Technology - Open Systems Interconnection - Upper Layers Security Model.pdf(25页珍藏版)》请在麦多课文档分享上搜索。
1、I NTERNAT I ONAL STANDARD ISO/IEC 10745 First edition 1995-08-1 5 (Reaffirmed 2004) Information technology - Open Systems Interconnection - Upper layers security model Technologies de Iinformation - Interconnexion de systkmes ouverts - Modele de and b) the utilization of these services and protocols
2、 to fulfil the security requirements of a wide variety of applications, so that the need for application-specific ASEs to contain internal security services is minimized. In particular, this Recommendation I International Standard specifies: a) b) the security aspects of communication in the upper l
3、ayers of 0%; the support in the upper layers of the security services defined in the OS1 Security Architecture and the Security Frameworks for Open Systems; c) the positioning of, and relationships among, security services and mechanisms in the upper layers, according to the guidelines of CCITT Rec.
4、 X.800 I IS0 7498-2 and ITU-T Rec. X.207 I ISOAEC 9545. the interactions among the upper layers, and interactions between the upper layers and the lower layers, in providing and using security services; d) e) the requirement for management of security information in the upper layers. 1.3 and mechani
5、sms for controlling access to OS1 resources and resources accessible via OSI. With respect to access control, the scope of this Recommendation I International Standard includes services 1.4 This Recommendation I International Standard does not include: a) definition of OS1 services or specification
6、of OS1 protocols; b) c) specification of security techniques and mechanisms, their operation, and their protocol requirements; or aspects of providing security which are not concerned with OS1 communications. 1.5 This Recommendation I International Standard is neither an implementation specification
7、 for systems nor a basis for appraising the conformance of implementations. NOTE - The scope of this Recommendation I International Standard includes security for connectionless applications and for distributed appIications (such as store-and-forward applications, chained applications, and applicati
8、ons acting on behalf of other applications). 2 Normative references The following Recommendations and International Standards contain provisions which, through reference in this text, constitute provisions of this Recommendation I International Standard. At the time of publication, the editions indi
9、cated were valid. All Recommendations and Standards are subject to revision, and entities to agreements based on this Recommendation I International Standard are encouraged to investigate the possibility of applying the most recent editions of the Recommendations and Standards listed below. Members
10、of IEC and IS0 maintain registers of currently valid International Standards. The Telecommunication Standardization Bureau of the ITU maintains a list of currently valid ITU-T Recommendations. ITU-T Rec. X.803 (1994 E) 1 ISO/IEC 10745 : 1995 (E) 2.1 Identical Recommendations I International Standard
11、s - ITU-T Recommendation X.207 (1993) I ISO/IEC 9545:1994, Information technology - Open Systems Interconnection - Application layer structure. ITU-T Recommendation X.811 l) (1993) I ISOflEC 10181-2 I, Information technology - Security frameworks in Open Systems: Authentication framework. ITU-T Reco
12、mmendation X.8 12l) (1993) I ISOflEC 1018 1-3 .!I, Information technology - Security frameworks in Open Systems: Access control framework. - - 2.2 Paired Recommendations I International Standards equivalent in technical content - CCITT Recommendation X.200 (19 1984/Corr. 1 : 1988, Information proces
13、sing systems - Open Systems Interconnection - Basic Reference Model. CCITT Recommendation X.2 16 (1 988), Presentation service defnition for open systems interconnection for CCIiT applications. IS0 8822: 1988, Information processing systems - Open Systems Interconnection - Connection oriented presen
14、tation service definition. - CCITT Recommendation X.217 (1988), Association control service definition for open systems interconnection for CCITT applications. IS0 8649: 1988, Information processing systems - Open Systems Interconnection - Service definition for the Association Control Service Eleme
15、nt. - CCITT Recommendation X.700 (1992), Management framework definition for Open Systems Interconnection for CCITT applications. ISOAEC 7498-4: 1989, Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 4: Management framework. CCITT Recommendation X.800 (199
16、 l), Securzv architecture fur Open Systems Interconnection for CCITT applications. IS0 7498-2: 1989, Information processing systems - Open Systems Znlerconnection - Basic Reference Model -Part 2: Security architecture. - - Definitions 3.1 The following terms are used as defined in CCITT Rec. X.200 I
17、 IS0 7498: abstract syntax ; application-enti ty ; application-process; application-process-invocation; application-protocol-control-information; application-protocol-data-unit; local system environment; (N)-function ; (N)-relay ; open system; presentation context; presen tation-entity ; 1, Presentl
18、y at stage of draft. 2 ITU-T Rec. X.803 (1994 E) ISO/IEC 10745 : 1995 (E) m) real open system; n) 0) transfer syntax. The following terms are used as defined in CCITT Rec, X.800 I IS0 7498-2: a) access control; b) authentication; c) confidentiality; d) data integrity; e) data origin authentication;
19、f) decipherment; g) encipherment; h) key; s y s tem s-managemen t; 3.2 i) non-repudiation; j) notarization; k) 1) security audit; m) Security Management Information Base; n) security policy; 0) selective field protection; p) signature; q) traffic flow confidentiality; c) trusted functionality. The f
20、ollowing terms are used as defined in CCITT Rec. X.700 I ISO/IEC 7498-4: a) Management Information; b) OS1 Management. The following terms are used as defined in Rec. ETU-T Rec. X.207 I ISO/IEC 9545 a) application-association; b) application-context; c) application-en ti ty -invoc ation (AEI) ; d) a
21、pplication-service-element (ASE); e) ASE-type; f) application-service-object (ASO); g) ASO-association; h) ASO-context; i) ASO-invocation; j) ASO-type; k) control function (CF). The following term is used as defined in CCITT Rec. X.216 I IS0 8822: - presentation data value. The following terms are u
22、sed as defined in ITU-T Rec. X.811 I ISO/IEC 10181-2: a) authentication exchange; b) claim authentication information; c) claimant; peer-en ti ty authentic ation; 3.3 3.4 3.5 3.6 ITU-T Rec. X.803 (1994 E) 3 ISO/IEC 10745 : 1995 (E) d) exchange authentication information; e) entity authentication; f,
23、 principal; g) verification authentication information; f) verifier. 3.7 3.8 The following terms are used as defined in ITU-T Rec. X.812 I ISOAEC 10181-3: a) access control certificate; b) access control information. For the purposes of this Recommendation 1 International Standard, the following def
24、initions apply: association security state: Security state relating to a security association. protecting presentation context: A presentation context that associates a protecting transfer syntax with an abstract syntax. protecting transfer syntax: A transfer syntax based on encoding/decoding proces
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CANCSAISOIEC107451996INFORMATIONTECHNOLOGYOPENSYSTEMSINTERCONNECTIONUPPERLAYERSSECURITYMODELPDF

链接地址:http://www.mydoc123.com/p-590234.html