ITU-T X 814-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Confidentiality Framework - Data Networks and Open System Communicatio.pdf
《ITU-T X 814-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Confidentiality Framework - Data Networks and Open System Communicatio.pdf》由会员分享,可在线阅读,更多相关《ITU-T X 814-1995 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems Confidentiality Framework - Data Networks and Open System Communicatio.pdf(25页珍藏版)》请在麦多课文档分享上搜索。
1、 ITU-T RECHN*X-814 95 4862591 Ob13351 121 INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU DATA NETWORKS AND OPEN SYSTEM COMM UN ICATIONS SECURITY X.814 (1 1/95) INFORMATION TECHNOLOGY - OPEN SYSTEMS INTERCONNECTION - SECURITY FRAMEWORKS FOR OPEN SYSTEMS: C
2、ONFIDENTIALITY FRAMEWORK ITU-T Recommendation X.814 (Previously “CCIlT Recommendation”) COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling Services ITU-T RECMN*X.814 75 = 4862571 0633352 Ob8 = FOREWORD ITU (International Telecommunication Union) i
3、s the United Nations Specialized Agency in the field of telecommunications. The IT Telecommunication Standardization Sector (IW-T) is a permanent organ of the IT. Some 179 member countries, 84 telecom operating entities, 145 scientific and industrial organizations and 38 international organizations
4、participate in ITU-T which is the body which sets world telecommunications standards (Recommendations). The approval of Recommendations by the Members of ITU-T is covered by the procedure laid down in WTSC Resolution No. 1 (Helsinki, 1993). In addition, the World Telecommunication Standardization Co
5、nference (WTSC), which meets every four years, approves Recommendations submitted to it and establishes the study programme for the following period. In some areas of information technology which fall within IT-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IE
6、C. The text of IT-T Recommendation X.814 was approved on 21st of November 1995. The identical text is also published as JSOAEC International Standard 101 81-5. NOTE In this Recommendation, the expression “Administration” is used for conciseness to indicate both a telecommunication administration and
7、 a recognized operating agency. O ITU 1996 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the IT. COPYRIGHT International Telecommunications
8、 Union/ITU TelecommunicationsLicensed by Information Handling ServicesITU-T RECMN*X=BL4 95 = 4862.571 Ob33353 TT4 Subject area PUBLIC DATA NETWORKS ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS Recommendation Series (February 1994) ORGANIZATION OF X-SERIES RECOMMENDATIO
9、NS Services and Facilities X. l-X. 19 Transmission, Signalling and Switching Network Aspects I Intedaces I X.20-X.49 I X.50-X.89 X.90-X. 149 - Maintenance X.150-X.179 Administrative Arrangements X.180-X.199 OPEN SYSTEMS INTERCONNECTION Model and Notation X.200-X.209 Service Definitions Connection-mo
10、de Protocol Specifications I Connectionless-mode Protocol Specifications I X.230-X.239 I X.210-X.219 X.220-X.229 PICS Proformas Protocol Identification X.240-X.259 X.260-X.269 Security Protocols Layer Managed Objects X.270-X.279 X.280-X.289 Conformance Testing INTERWORKING BETWEEN NETWORKS I MESSAGE
11、 HANDLING SYSTEMS I X.400-X.499 I X.290-X.299 Mobile Data Transmission Systems Management I OS1 NETWORKING AND SYSTEM ASPECTS X.350-X.369 X.370-X.399 DIRECTORY X.500-X.599 Networking Naming, Addressing and Registration I Commitment, Concurrency and Recovery I X.850-X.859 X .600-X. 649 X.650-X.679 Ab
12、stract Syntax Notation One (ASN. 1) OS1 MANAGEMENT X.680-X.699 x.700-x.799 SECURITY OS1 APPLICATIONS X.800-X.849 Transaction Processing Remote Operations OPEN DISTRIBUTED PROCESSING X.860-X.879 X.880-X.899 x.900-x.999 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by
13、 Information Handling Services1 2 3 4 5 6 7 8 9 CONTENTS Page Scope 1 Normative references . 2 2.1 Identical Recommendations I International Standards 2 2.2 Paired Recommendations I International Standards equivalent in technical content 2 Definitions 2 3.1 Basic Reference Model definitions . 2 3.2
14、Security architecture definitions . 3 3.3 Security frameworks overview definitions . 3 3.4 Additional definitions . 3 Abbreviations . 4 General discussion of confidentiality . 4 5.1 Basic concepts . 5.1.1 Protection of information 5.1.2 Hide and reveal operations Classes of confidentiality services
15、Types of confidentiality mechanisms 5.4 Threats to confidentiality 5.4.1 Threats when confidentiality is provided through access prevention . 5.4.2 Threats when confidentiality is provided through information hiding . 5.2 5.3 5.5 Types of confidentiality attacks Confidentiality policies 7 6.1 Policy
16、 expression 8 6.1.1 Information characterization . 8 6.1.2 Entity characterization 8 Confidentiality information and facilities 7.1 Confidentiality information . 7.1.2 Revealing confidentiality information 7.2 Confidentiality facilities 7.2.1 Operation related facilities 7.2.1.1 Hide . 7.2.1.2 Revea
17、l . 7.2.2 Management related facilities . 7.1.1 Hiding confidentiality information . Confidentiality mechanisms . 8.1 Confidentiality provision through access prevention Confidentiality protection through physical media protection Confidentiality protection through routing control . Confidentiality
18、provision through encipherment Confidentiality provision through dummy events . Confidentiality provision through PDU header protection . Confidentiality provision through time varying fields Confidentiality provision through contextual location . 8.1.1 8.1.2 8.2.1 8.2.2 8.2.3 8.2.4 8.2 Confidential
19、ity provision through data padding . 8.3 10 10 10 10 10 10 11 11 11 11 Interactions with other security services and mechanisms . 12 9.1 Access Control 12 ITU-T Rec . X.814 (1995 E) 1 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesITU-
20、T RECflN*X- identifies possible classes of confidentiality mechanisms; classifies and identifies facilities for each class of confidentiality mechanisms; identifies management required to support the classes of confidentiality mechanism; and addresses the interaction of confidentiality mechanism and
21、 the supporting services with other security services and mechanisms. A number of different types of standards can use this framework, including: 1) 2) 3) 4) 5) standards that incorporate the concept of confidentiality; standards that specify abstract services that include confidentiality; standards
22、 that specify uses of a confidentiality service; standards that specify means of providing confidentiality within an open system architecture; and standards that specify confidentiality mechanisms. Such standards can use this framework as follows: - - - standards of type l), 2), 3), 4) and 5) can us
23、e the terminology of this framework; standards of type 2), 3), 4) and 5) can use the facilities defined in clause 7 of this framework; standards of type 5) can be based upon the classes of mechanism defined in clause 8 of this framework. As with other security services, confidentiality can only be p
24、rovided within the context of a defined security policy for a particular application. The definitions of specific security policies are outside the scope of this Recommendation I International Standard. It is not a matter for this Recommendation I International Standard to specify details of the pro
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTX8141995INFORMATIONTECHNOLOGYOPENSYSTEMSINTERCONNECTIONSECURITYFRAMEWORKSFOROPENSYSTEMSCONFIDENTIALITYFRAMEWORKDATANETWORKSANDOPENSYSTEMCOMMUNICATIOPDF

链接地址:http://www.mydoc123.com/p-805770.html