ITU-T X 841-2000 Information Technology - Security Techniques - Security Information Objects for Access Control Series X Data Networks and Open System Communications Security (Stud.pdf
《ITU-T X 841-2000 Information Technology - Security Techniques - Security Information Objects for Access Control Series X Data Networks and Open System Communications Security (Stud.pdf》由会员分享,可在线阅读,更多相关《ITU-T X 841-2000 Information Technology - Security Techniques - Security Information Objects for Access Control Series X Data Networks and Open System Communications Security (Stud.pdf(26页珍藏版)》请在麦多课文档分享上搜索。
1、INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU X.841 (1 0/2000) SERIES X: DATA NETWORKS AND OPEN SYSTEM COM M U N I CATI ON S Security Information technology - Security techniques - Security information objects for access control ITU-T Recommendation X.84
2、1 (Formerly CCITT Recommendation) ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS PUBLIC DATA NETWORKS Services and facilities Interfaces Transmission, signalling and switching Network aspects Maintenance Administrative arrangements Model and notation Service definitions
3、Connection-mode protocol specifications Connectionless-mode protocol specifications PICS proformas Protocol Identification Security Protocols Layer Managed Objects Conformance testing General Satellite data transmission systems IP-based networks MESSAGE HANDLING SYSTEMS DIRECTORY OS1 NETWORKING AND
4、SYSTEM ASPECTS Networking Efficiency Quality of service Naming, Addressing and Registration Abstract Syntax Notation One (ASN. 1) Systems Management fiamework and architecture Management Communication Service and Protocol Structure of Management Information Management functions and ODMA functions OP
5、EN SYSTEMS INTERCONNECTION INTERWORKING BETWEEN NETWORKS OS1 MANAGEMENT SECURITY OS1 APPLICATIONS Commitment, Concurrency and Recoveq Transaction processing Remote operations OPEN DISTRIBUTED PROCESSING X. l-X. 19 X.20-X.49 X.50-X.89 X.90-X.149 X. 150-X. 179 X. 180-X. 199 X.200-X.209 X.210-X.219 X.2
6、20-X.229 X.230-X.239 X.240-X.259 X.260-X.269 X.270-X.279 X.280-X.289 X.290-X.299 X.300-X.349 X.350-X.369 x.370-x.399 X.400-X.499 X.500-X.599 X.600-X.629 X.630-X.639 X.640-X. 649 X.650-X.679 X.680-X.699 X.700-X.709 X.710-X.7 19 X.720-X.729 x.730-x.799 X.800-X.849 X.850-X.859 X.860-X.879 X.880-X.899 X
7、.900-X.999 For further details, please refer to the list of ITU-T Recommendations. INTERNATIONAL STANDARD 15816 ITU-T RECOMMENDATION X.841 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY INFORMATION OBJECTS FOR ACCESS CONTROL Summary This Recommendation I International Standard provides obje
8、ct definitions that are commonly needed in security standards to avoid multiple and different definitions of the same functionality. Precision in these definitions is achieved by use of the Abstract Syntax Notation One (ASN. 1). This Recommendation I International Standard covers only static aspects
9、 of Security Information Objects (SIOs). Source ITU-T Recommendation X.841 was prepared by ITU-T Study Group7 (1997-2000) and approved by the World Telecommunication Standardization Assembly (Montreal, 27 Septembre - 6 October 2000). An identical text is also published as ISOAEC 158 16. ITU-T X.841(
10、10/2000 E) i FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff q
11、uestions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendat
12、ions on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. NOTE In this Recommendatio
13、n, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a cl
14、aimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had
15、 not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. O ITU 2001 All righ
16、ts reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from ITU. 11 ITU-T X.841(10/2000 E) CONTENTS Scope Normative references 2.1 Identical Recommendations I In
17、ternational Standards . 2.2 Definitions Abbreviations Conventions 5.1 5.2 5.3 Security Information Object Composition . Specification of Security Information Objects 6.1.1 Introduction . 6.1.2 ASN.1 Specification of the Label 6.1.3 Security Policy Information File . 6.2.1 introduction . 6.2.2 ASN.l
18、Specification of the Security Policy Information File . 6.3 Clearance Attribute Introduction . 6.3.1 6.3.2 Definition of clearance attribute Security Information Object Interaction . Security Information Object Interaction for Access Control . Paired Recommendations I International Standards equival
19、ent in technical content . Security Information Object Class Description . Generic Security Information Object Class Correspondence 6.1 Confidentiality Label . Binding Methods for Confidentiality Labels . 6.2 7.1 7.2 SI0 Class Structure Comparison . Annex A . Security Information Objects for Access
20、Control in ASN.1 . Annex B . Expansion of the SECURITY-CATEGORY Syntax Page 1 1 1 2 2 2 3 3 3 3 3 3 3 4 5 5 5 6 9 9 10 10 10 10 13 19 . ITU-T X.841(10/2000 E) 111 Introduction This Recommendation I International Standard on Security Information Objects (SIOs) for Access Control provides object defin
21、itions that are commonly needed in more than one security standard such that multiple and different definitions of the same functionality may be avoided. Precision in these definitions is achieved by use of the Abstract Syntax Notation One (ASN.l) defined in ITU-T Rec. X.680 (1997) I ISOAEC 8824-1:1
22、998, and ITU-T Rec. X.681 The aim of security management is to ensure that assets, including information, are protected appropriately and cost effectively. In order to protect proprietary interests and Intellectual Property Rights, organizations need to control the handling of their information. Sev
23、ere damage or embarrassment can be caused to either the originator or holder of sensitive information, for example, if it is released to those not authorized to receive it (a breach of confidentiality), or if it is modified in any way (a breach of integrity). Each organization needs to ensure that i
24、t protects its own information and assets adequately in all forms during its storage, processing and transmission between and within organizations over both private and public networks. Organizations must be satisfied that their assets will be protected properly when they are held or processed by ot
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTX8412000INFORMATIONTECHNOLOGYSECURITYTECHNIQUESSECURITYINFORMATIONOBJECTSFORACCESSCONTROLSERIESXDATANETWORKSANDOPENSYSTEMCOMMUNICATIONSSECURITYSTUDPDF

链接地址:http://www.mydoc123.com/p-805803.html