ITU-T X 802-1995 Information Technology - Lower Layers Security Model - Data Networks and Open System Communications - Security 22 pp《信息技术-低层安全模式-数据网络和开放系统通信-安全 22页》.pdf
《ITU-T X 802-1995 Information Technology - Lower Layers Security Model - Data Networks and Open System Communications - Security 22 pp《信息技术-低层安全模式-数据网络和开放系统通信-安全 22页》.pdf》由会员分享,可在线阅读,更多相关《ITU-T X 802-1995 Information Technology - Lower Layers Security Model - Data Networks and Open System Communications - Security 22 pp《信息技术-低层安全模式-数据网络和开放系统通信-安全 22页》.pdf(22页珍藏版)》请在麦多课文档分享上搜索。
1、 ITU-T RECMN*X-8OZ 75 m- 4862593 Ob03535 942 INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS SECURITY X.802 (04/95) INFORMATION TECHNOLOGY - LOWER LAYERS SECURITY MODEL ITU-T Recommendation X.802 (Previously “CC
2、ITT Recommendation”) Foreword ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. Some 179 member countries, 84 telecom operating entities, 1
3、45 scientific and industrial organizations and 38 international organizations participate in ITU-T which is the body which sets world telecommunications standards (Recommendations). The approval of Recommendations by the Members of ITU-T is covered by the procedure laid down in WTSC Resolution No. 1
4、 (Helsinki, 1993). In addition, the World Telecommunication Standardization Conference (WTSC), which meets every four years, approves Recommendations submitted to it and establishes the study programme for the following period. In some areas of information technology which fall within ITU-Ts purview
5、, the necessary standards are prepared on a collaborative basis with IS0 and IEC. The text of ITU-T Recommendation X.802 was approved on 10th of April 1995. The identical text is also published as ISOAEC International Standard 13594. NOTE In this Recommendation, the expression “Administration” is us
6、ed for conciseness to indicate both a telecommunication administration and a recognized operating agency. O ITU 1995 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without per
7、mission in writing from the ITU. ITU-T RECflN*X-802 95 = 4862593 0603537 715 Services and Facilities Interfaces ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS (February 1994) ORGANIZATION OF X-SERIES RECOMMENDATIONS X.l-X. 19 X.20-X.49 I Subiect area I Recommendation Ser
8、ies I Transmission, Signalling and Switching Network Asvects I PUBLIC DATA NETWORKS I I X.50-X.89 X.90-X. 149 Administrative Arrangements OPEN SYSTEMS INTERCONNECTION X.180-X.199 I Maintenance I X. 150-X.179 I Model and Notation Service Definitions X.200-X.209 X.210-X.219 Connectionless-mode Protoco
9、l Specifications PICS Proformas I Connection-mode Protocol Specifications I X.220-X.229 I X.230-X.239 X.240-X.259 Security Protocols Layer Managed Objects I Protocol Identification I X.260-X.269 I X.270-X.25 X.280-X.289 Conformance Testing INTERWORKING BETWEEN NETWORKS X.290-X.299 I General I X.300-
10、X.349 I Mobile Data Transmission Systems Management X.350-X.369 X.370-X.399 I MESSAGE HANDLING SYSTEMS I X.400-X.499 I DIRECTORY OS1 NETWORKING AND SYSTEM ASPECTS X.500-X.599 Networking Naming, Addressing and Registration I Abstract Syntax Notation One (ASN. 1) I X.680-X.699 I X.600-X.649 X.650-X.67
11、9 OS1 MANAGEMENT SECURITY I OS1 APPLICATIONS I I X.700-X.799 X.800-X.849 Commitment, Concurrency and Recovery Transaction Processing I Remote Operations I X.880-X.899 I X.850-X.859 X.860-X.879 _ OPEN DISTRZBUTED PROCESSING X.900-X.999 ITU-T RECMN*X.802 95 = 4862591 KI603538 b51 1 2 3 4 5 6 7 8 9 10
12、11 12 13 14 15 16 17 18 19 CONTENTS Scope References 2.1 Identical Recommendations I International Standards 2.2 Paired Recommendations I International Standards equivalent in technical content 2.3 Additional references Definitions. . 3.1 OS1 Reference Model definitions . 3.2 Open System Security Fr
13、ameworks definitions 3.3 Internal Organization of the Network Layer definitions . 3.4 Additional definitions . Abbreviations . Security associations 5.1 General overview 5.2 Establishing a security association for the lower layers 5.3 Security association close . 5.4 Modification of attributes in a
14、connection Influence on existing protocols 6.2 Connectionless SDU size 6.3 Concatenation of PDUs . 6.4 Algorithm and mechanism independence . 6.1 General principle . Common security PDU structure . Determination of security services and mechanisms Protection QOS Security rules Placement of security
15、in the lower layers . Use of (N-1)-layer(s) to enhance (N)-layer security Security labelling . Security of routeing 16.1 Security policy 16.2 Security association management . Security domains Security Management . 16.3 Key management 16.4 Security Audit . Traffic flow confidentiality Guidelines for
16、 the definition of SA-Attributes . Error handling Annex A . Illustrative example of an Agreed Set of Security Rules ITU-T Rec . X.802 (1995 E) Page 1 1 1 2 2 2 2 3 3 3 3 3 3 5 6 6 6 6 6 6 6 7 7 7 7 7 13 13 13 13 14 14 14 14 14 14 15 15 16 1 ITU-T RECMN*Xm802 95 4Ab259L Ob03539 598 Summary This Recom
17、mendation I International Standard describes the cross layer aspects of the revision of security services in the lower layers of the OS1 Reference Model (Transport, Network, Data Link, Physical). It describes the architectural concepts common to these layers, the basis for interactions relating to s
18、ecurity between layers and the placement of security protocols in the lower layers. 11 ITU-T Rec. X.802 (1995 E) - ITU-T RECMNxX.802 95 48b259L Ob03540 2OT ISO/IEC TR 13594 : 1995 (E) TECHNICAL REPORT ITU-T RECOMMENDATION INFORMATION TECHNOLOGY - LOWER LAYERS SECURITY MODEL 1 Scope This Recommendati
19、on I Technical Report describes the cross layer aspects of the provision of security services in the lower layers of the OS1 Reference Model (Transport, Network, Data Link and Physical layers). This Recommendation I Technical Report describes: a) architectural concepts common to the lower layers bas
20、ed on those defined in CCITT Rec. X.800 I the basis for interactions relating to security between protocols in the lower layers; the basis for any interactions relating to security between the lower layers and upper layers of OSI; the placement of security protocols in relation to other lower layer
21、security protocols and the relative role of such placements. IS0 7498-2; b) c) d) There should be no conflict between the security protocols for the lower layers and the model described in this Recommendation I Technical Report. CCITT Rec. X.500 I ISO/IEC 9594-1 identifies the security services rele
22、vant to each of the lower layers of the OS1 Reference Model. 2 References The following Recommendations and International Standards contain provisions which, through reference in this text, constitute provisions of this Recommendation I Technical Report. At time of publication, the editions indicate
23、d were valid. All Recommendations and Standards are subject to revision, and parties to agreements based on this Recommendation I Technical Report are encouraged to investigate the possibility of applying the most recent edition of the Recommendations and Standards listed below. Members of IEC and I
24、S0 maintain registers of currently valid International Standards. The Telecommunication Standardization Bureau of the ITU maintains a list of currently valid ITU-T Recommendations. Identical Recommendations I International Standards - ITU-T Recommendation X.200 (1994) I ISO/IEC 7498-1:1994, Infomzat
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTX8021995INFORMATIONTECHNOLOGYLOWERLAYERSSECURITYMODELDATANETWORKSANDOPENSYSTEMCOMMUNICATIONSSECURITY22PP

链接地址:http://www.mydoc123.com/p-805746.html