ITU-T X 810-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Overview - Data Networks and Open System Communications Security 27 pp.pdf
《ITU-T X 810-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Overview - Data Networks and Open System Communications Security 27 pp.pdf》由会员分享,可在线阅读,更多相关《ITU-T X 810-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Overview - Data Networks and Open System Communications Security 27 pp.pdf(27页珍藏版)》请在麦多课文档分享上搜索。
1、INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU DATA NETWORKS AND OPEN SYSTEM CO MM UN ICATIONS SECURITY X.81 O (1 1 /95) INFORMATION TECHNOLOGY - c OPEN SYSTEMS INTERCONNECTION - SECURITY FRAMEWORKS FOR OPEN SYSTEMS: OVERVIEW ITU-T Recommendation X.81 O (
2、Previously “CCIlT Recommendation”) COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesITU-T RECMN*X.BLO 95 W 48b2591 Ob13282 914 W FOREWORD IT (International Telecommunication Union) is the United Nations Specialized Agency in the field of
3、 telecommunications. The IT Telecommunication Standardization Sector (IT-T) is a permanent organ of the ITU. Some 179 member countries, 84 telecom operating entities, 145 scientific and industrial organizations and 38 international organizations participate in ITU-T which is the body which sets worl
4、d telecommunications standards (Recommendations). The approval of Recommendations by the Members of ITU-T is covered by the procedure laid down in WTSC Resolution No. 1 (Helsinki, 1993). In addition, the World Telecommunication Standardization Conference (WTSC), which meets every four years, approve
5、s Recommendations submitted to it and establishes the study programme for the following period. In some areas of information technology which fall within IW-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. The text of IT-T Recommendation X.810 was approved
6、on 21st of November 1995. The identical text is also published as ISO/IEC International Standard 10181-1. NOTE In this Recommendation, the expression “Administration” is used for conciseness to indicate both a telecommunication administration and a recognized private operating agency. O ITU 1996 All
7、 rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the . COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Informa
8、tion Handling Services ITU-T RECMNUX.810 95 = 4Bib2591 Ob13283 850 PUBLIC DATA NETWORKS Services and Facilities KU-T X-SERIES RECOMMENDATIONS DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS (February 1994) ORGANIZATION OF X-SERIES RECOMMENDATIONS x. I-x. 19 I Subject area I Recommendation Series I Inte
9、rfaces Transmission, Signalling and Switching X.20-X.49 X.50-X.89 Network Aspects Maintenance X.90-X. 149 X. 150-X. 179 Administrative Arrangements OPEN SYSTEMS INTERCONNECTION X.180-x.199 Model and Notation x.200-x.209 Service Definitions X.210-X.219 Connectionless-mode Protocol Specifications PICS
10、 Proformas Protocol Identification X.230-X.239 X.240-X.259 X.260-X.269 I DIRECTORY I X.500-X.599 Security Protocols Layer Managed Objects X.270-X.279 X.280-X.289 Conformance Testing INTERWORKING BETWEEN NETWORKS X.290-X.299 General Mobile Data Transmission Systems X. 300-X. 349 X.350-X.369 Managemen
11、t MESSAGE HANDLING SYSTEMS X.370-X.399 X.400-X.499 OS1 NETWORKING AND SYSTEM ASPECTS Networking Naming, Addressing and Registration X.600-X. 649 X.650-X.679 Abstract Syntax Notation One (ASN. I) OS1 MANAGEMENT _ X.680-X.699 x.700-x.799 SECURITY OS1 APPLICATIONS X.800-X.849 Commitment, Concurrency an
12、d Recovery Transaction Processing Remote Operations OPEN DISTRIBUTED PROCESSING X.850-X.859 X. 860-X. 879 X.880-X.899 x.900-x.999 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesITU-T RECMN*XmB30 95 m 4862573 Ob33284 797 m 1 2 3 4 5 6 7
13、 8 9 CONTENTS Page Scope 1 Normative references . 1 2.1 Identical Recommendations I International Standards 1 2.2 Paired Recommendations i international Standards equivalent in technical content 1 Definitions 2 3.1 Basic Reference Model definitions . 2 3.2 Security architecture definitions . 2 3.3 A
14、dditional definitions . 2 Abbreviations . 4 Notation 4 Organization . 6.1 Part 1 - Overview . 6.2 Part 2 - Authentication . 6.3 Part 3 - Access control . 6.4 Part 4 - Non-repudiation . 6.5 Part 5 - Confidentiality . 6.6 Part 6 - Integrity . 6.7 Part 7 - Security audit and alarms 6.8 Key management C
15、ommon concepts 7.1 Security information . 7.2 Security domain 7.2.1 Security policy and security policy rules 7.2.2 Security domain authority . 7.2.3 Inter-relationships among security domains . 7.2.4 Establishment of secure interaction rules 7.2.5 Inter-domain security information transfer . 7.3 Se
16、curity policy considerations for specific security services 7.4 Trusted entities 4 4 4 5 5 5 6 6 6 6 7 7 7 8 8 9 9 9 9 7.5 Trust 10 7.6 Trusted third parties 10 Generic security information 8.1 Security labels . 8.2 Cryptographic checkvalues . 8.3 Security certificates . 8.3.1 Introduction to securi
17、ty certificates . 8.3.2 Verification and chaining of security certificates . 8.3.3 Revocation of security certificates 8.3.4 Re-use of security certificates . 8.3.5 Security certificate structure . 8.4 Security tokens 10 10 11 11 11 12 12 12 12 13 Generic security facilities . 13 9.1 Management rela
18、ted facilities . 13 9.1.1 Instail Si 13 9.1.2 Deinstall SI 13 9.1.3 Change SI 13 ITU-T Rec . X.810 (1995 E) i COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesITU-T RECNNUX.810 95 m 4862591 Ob13285 623 m 9.1.4 Validate SI 9.1.5 Invalidat
19、e SI 9.1.6 DisabIrne-enable security service . 9.1.7 Enrol 9.1.8 Un-enrol 9.1.9 Distribute SI 9.1.10 List SI 9.2 Operational related facilities . 9.2.1 Identify trusted security authorities . 9.2.2 Identify secure interaction rules 9.2.3 Acquire SI . 9.2.4 Generate SI 9.2.5 Verify SI . 10 Interactio
20、ns between security mechanisms 11 Denial of service and availability . 12 Other requirements . Annex A - Some examples of protection mechanisms for security certificates . Protection using an OS1 communications security service . Protection using a parameter within the security certificate . A.2.1 T
21、he authentication method A.2.2 The secret key method A.2.3 The public key method A.2.4 The one-way function method Protection of the internal and external parameters while in transit . A.3.1 Transfer of internal parameters to the issuing security authority A.3.2 Transfer of external parameters among
22、 entities Use of security certificates by single entities or by groups of entities Linking a security certificate with accesses Annex B - Bibliography . A . 1 A.2 A.3 A.4 AS Page 14 14 14 14 14 14 14 14 14 14 14 14 15 15 15 16 17 17 17 17 17 18 18 18 18 18 19 19 20 11 ITU-T Rec . X.810 (1995 E) COPY
23、RIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesITU-T RECNN*X.BltO 95 = 48b259L Ob33286 5bT Summary This Recommendation I International Standard defines the framework within which security services for open systems are specified. This part
24、of the Security Frameworks describes the organization of the security framework, defines security concepts which are required in more than one part of the security framework, and describes the interrelationship of the services and mechanisms identified in other parts of the framework. Introduction M
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTX8101995INFORMATIONTECHNOLOGYOPENSYSTEMSINTERCONNECTIONSECURITYFRAMEWORKSFOROPENSYSTEMSOVERVIEWDATANETWORKSANDOPENSYSTEMCOMMUNICATIONSSECURITY27PPPDF

链接地址:http://www.mydoc123.com/p-805758.html