1、BRITISH STANDARD BS ISO/IEC 11586-6:1997 Information technology OpenSystems Interconnection Generic upper layers security: Protectingtransfer syntax Protocol Implementation Conformance Statement (PICS) proforma (ITU-T Rec. X.835 (1996)|ISO/IEC 11586-6:1997) ICS 35.100.70BSISO/IEC:11586-6:1997 This B
2、ritish Standard, having been prepared under the directionof the DISC Board, waspublished under the authorityof the Standards Boardand comes into effect on 15 August 1997 BSI 12-1999 ISBN 0 580 27860 3 National foreword This British Standard reproduces verbatim ISO/IEC11586-6:1997 and implements it a
3、s the UK national standard. The UK participation in its preparation was entrusted to Technical Committee IST/21, Open Systems Interconnection, Data Management and Open Distributed Processing, which has the responsibility to: aid enquirers to understand the text; present to the responsible internatio
4、nal/European committee any enquiries on the interpretation, or proposals for change, and keep the UK interests informed; monitor related international and European developments and promulgate them in the UK. A list of organizations represented on this committee can be obtained on request to its secr
5、etary. Cross-references The British Standards which implement international or European publications referred to in this document may be found in the BSI Standards Catalogue under the section entitled “International Standards Correspondence Index”, or using the “Find” facility of the BSI Standards E
6、lectronic Catalogue. A British Standard does not purport to include all the necessary provisions of a contract. Users of British Standards are responsible for their correct application. Compliance with a British Standard does not of itself confer immunity from legal obligations. Summary of pages Thi
7、s document comprises a front cover, an inside front cover, pages i and ii, theISO/IEC title page, pages ii to iv, pages 1 to 9 and a back cover. This standard has been updated (see copyright date) and may have had amendments incorporated. This will be indicated in the amendment table on the inside f
8、ront cover. Amendments issued since publication Amd. No. Date CommentsBSISO/IEC:11586-6:1997 BSI 12-1999 i Contents Page National foreword Inside front cover Foreword iii Text of ISO/IEC 11586-6 1ii blankBSISO/IEC:11586-6:1997 ii BSI 12-1999 Contents Page Foreword iii Introduction 1 1 Scope 1 2 Norm
9、ative references 1 2.1 Identical Recommendations|International Standards 1 2.2 Paired Recommendations|International Standards equivalent in technical content 1 3 Definitions 2 4 Abbreviations 2 5 Conventions 2 6 Conformance 2 Annex A Protocol Implementation Conformance Statement (PICS) proforma for
10、the Protecting Transfer Syntax 3 A.1 Notations defined for the proforma 3 A.2 PICS numbers 3 A.3 Completion of the PICS 4 A.4 Date of statement 4 A.5 Implementation details 4 A.6 ITU-T Rec. X.833|ISO/IEC 11586-4 protocol details 5 A.7 Global statement of conformance 5 A.8 Supported syntax structures
11、 5 A.9 Supported PDV fields 5 A.10 Establishment of encoding for Protecting Transfer Syntax 6 A.11 Security transformations 6 Descriptors: Data processing, information interchange, network interconnection, open systems interconnection, communication procedure, security techniques, protocols, impleme
12、ntation.BSISO/IEC:11586-6:1997 BSI 12-1999 iii Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the develo
13、pment of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-government
14、al, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publicati
15、on as an International Standard requires approval by at least 75% of the national bodies casting a vote. International Standard ISO/IEC11586-6 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 21, Open systems interconnection, data management and open d
16、istributed processing, in collaboration with ITU-T. The identical text is published as ITU-T Recommendation X.835. ISO/IEC11586 consists of the following parts, under the general title Information technology Open Systems Interconnection Generic upper layers security: Part 1: Overview, models and not
17、ation; Part 2: Security Exchange Service Element (SESE) service definition; Part 3: Security Exchange Service Element (SESE) protocol specification; Part 4: Protecting transfer syntax specification; Part 5: Security Exchange Service Element (SESE) Protocol Implementation Conformance Statement (PICS)
18、 proforma; Part 6: Protecting transfer syntax Protocol Implementation Conformance Statement (PICS) Proforma. Annex A forms an integral part of this part of ISO/IEC11586.iv blankBSISO/IEC11586-6:1997 BSI 12-1999 1 Introduction This Recommendation|International Standard forms part of a series of Recom
19、mendations|International Standards that provide generic upper layer security services. The parts are as follows: 1) Overview, Model and Notation. 2) Security Exchange Service Element Service Definition. 3) Security Exchange Service Element Protocol Specification. 4) Protecting Transfer Syntax Specif
20、ication. 5) Security Exchange Service Element Service PICS Proforma. 6) Protecting Transfer Syntax PICS Proforma. This Recommendation|International Standard constitutes Part 6 of the series. Part 4 defines protecting transfer syntax for communications transfers between open systems as part of the op
21、eration of a security mechanism. To evaluate the conformance of a particular implementation, it is necessary to have a description of the capabilities and options which have been implemented. Such a description is called a Protocol Implementation Conformance Statement (PICS). This Recommendation|Int
22、ernational Standard includes the PICS proforma for the protecting transfer syntax specified in Part 4 and the security transformations defined in Part 1, Annex D. 1 Scope This Recommendation|International Standard defines a Protocol Implementation Conformance Statement (PICS) proforma for the detail
23、ed expression of the conformance requirements of ITU-T Rec. X.833|ISO/IEC11586-4 and Annex D of ITU-T Rec. X.830|ISO/IEC11586-1. This PICS proforma is in compliance with the relevant requirements, and in accordance with the relevant guidance for a PICS proforma, given in ITU-T Rec. X.291 and ISO/IEC
24、 9646-2. Detail of the use of this proforma is provided in this Recommendation|International Standard. Implementations claiming conformance to ITU-T Rec. X.833|ISO/IEC 11586-4 or Annex D of ITU-T Rec. X.830|ISO/IEC 11586-1 shall complete the proforma as part of the conformance requirements. The leve
25、l of detail required in the proforma exceeds that of the protocol specification by requiring details to uniquely identify the implementation and the supplier. NOTEPICS are related to base Recommendations and Standards and only base Recommendations and Standards. PICS structure might be expanded and
26、refined for other documents using the base Standards (e.g. ISPICS). 2 Normative references The following Recommendations and International Standards contain provisions which, through reference in this text, constitute provisions of this Recommendation|International Standard. At the time of publicati
27、on, the editions indicated were valid. All Recommendations and Standards are subject to revision, and the parties to agreements based on this Recommendation|International Standard are encouraged to investigate the possibility of applying the most recent edition of the Recommendations and Standards i
28、ndicated below. Members of IEC and ISO maintain registers of currently valid International Standards. The Telecommunication Standardization Bureau of the ITU maintains a list of currently valid ITU-T Recommendations. 2.1 Identical Recommendations|International Standards ITU-T Recommendation X.830 (1
29、995)|ISO/IEC 11586-1:1996, Information technology Open Systems Interconnection Generic upper layers security: Overview, models and notation. ITU-T Recommendation X.833 (1995)|ISO/IEC 11586-4:1996, Information technology Open Systems Interconnection Generic upper layers security: Protecting transfer
30、syntax specification. ITU-T Recommendation X.210 (1993)|ISO/IEC 10731:1994, Information technology Open Systems Interconnection Basic Reference Model: Conventions for the definition of OSI services. 2.2 Paired Recommendations|International Standards equivalent in technical content ITU-T Recommendati
31、on X.290 (1995), OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications General concepts. ISO/IEC 9646-1:1994, Information technology Open Systems Interconnection Conformance testing methodology and framwork Part 1: General concepts.BSISO/IEC11586-6:199
32、7 2 BSI 12-1999 ITU-T Recommendation X.291 (1995), OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications Abstract test suite specification. ISO/IEC 9646-2:1994, Information technology Open Systems Interconnection Conformance testing methodology and fra
33、mework Part 2: Abstract Test Suite specification. 3 Definitions 3.1 This Recommendation|International Standard makes use of the following terms defined in ITU-T Rec. X.290 and ISO/IEC9646-1: a) Protocol Implementation Conformance Statement (PICS); b) PICS proforma; c) Protocol Implementation extra I
34、nformation for Testing (PIXIT). 4 Abbreviations 4.1 The following abbreviations used in this Recommendation|International Standard are defined in ITU-T Rec. X.290 and ISO/IEC 9646-1: a) PICS; b) PIXIT. 5 Conventions This Recommendation|International Standard uses the descriptive conventions in the O
35、SI Service Conventions, ITU-T Rec. X.210|ISO/IEC10731. The PICS proforma Annex A has been designed to be a self contained section of this Recommendation|International Standard, for use in testing and procurement. 6 Conformance A conforming PICS proforma shall be technically equivalent to the ITU-T|I
36、SO/IEC published PICS proforma and shall preserve the numbering and ordering of the items in the ITU-T|ISO/IEC PICS proforma. A PICS which conforms to this Recommendation|International Standard shall: a) describe an implementation which conforms to ITU-T Rec. X.833|ISO/IEC 11586-4; b) be a conformin
37、g PICS proforma, which has been completed in accordance with the instruction for completion given inA.1 andA.3; and c) include the information necessary to uniquely identify both the supplier and the implementation.BSISO/IEC11586-6:1997 BSI 12-1999 3 Annex A Protocol Implementation Conformance State
38、ment (PICS) proforma for the Protecting Transfer Syntax 1)(This annex forms an integral part of this Recommendation|International Standard) A.1 Notations defined for the proforma In order to reduce the size of tables in the PICS proforma, notations have been introduced that have allowed the use of a
39、 multi-column layout, where the columns are headed “Status”, and “Support”. The definition of each of these follows. A.1.1 Status column This column indicates the level of support required for conformance to ITU-T Rec. X.833|ISO/IEC 11586-4. The values are as follows: A.1.2 Support column The “Suppo
40、rt” column shall be completed by the supplier or implementor to indicate the level of implementation of each feature. The proforma has been designed such that the only entries required in the “Support” column are: A.2 PICS numbers Each line within the PICS proforma which requires implementation deta
41、il to be entered is numbered at the left hand edge of the line. This numbering is included as a means of uniquely identifying all possible implementation details within the PICS proforma. The need for such unique referencing has been identified by the testing bodies. The means of referencing individ
42、ual responses should be to specify the following sequence: a) a reference to the smallest subclause enclosing the relevant item; b) a solidus character, “/”; c) the reference number of the row in which the response appears; d) if, and only if, more than one response occurs in the row identified by t
43、he reference number, then each possible entry is implicitly labelled a, b, c, etc., from left to right, and this letter is appended to the sequence. 1) Copyright release for PICS proforma Users of this Recommendation|International Standard may freely reproduce the PICS proforma in this annex so that
44、 it can be used for its intended purpose, and may further publish the completed PICS. M Mandatory support is required. O Optional support is permitted for conformance to ITU-T Rec. X.833|ISO/IEC 11586-4. If implemented it must conform to the specifications and restrictions contained in ITU-T Rec. X.
45、833|ISO/IEC 11586-4. These restrictions may affect the optionality of other items. n/a The item is not applicable. cn The item is conditional (where n is the number which identifies the condition which is applicable). The definitions for the conditional statements used in this Annex are written unde
46、r the tables in which they first appear. O.n The item is optional, but the optionality is qualified (where n is the number which identifies the qualification which is applicable). The definitions for the qualified optional statements used in this Annex are written under the tables in which they firs
47、t appear. Y Yes, the feature has been implemented N No, the feature has not been implemented Not applicable.BSISO/IEC11586-6:1997 4 BSI 12-1999 A.3 Completion of the PICS The implementor shall complete all entries in the column marked “Support”. In certain clauses of the PICS proforma further guidan
48、ce for completion may be necessary. Such guidance shall supplement the guidance given in this clause and shall have a scope restricted to the clause in which it appears. In addition, other specifically identified information shall be provided by the implementor where requested. No changes shall be m
49、ade to the proforma except the completion as required. Recognizing that the level of detail required may, in some instances, exceed the space available for responses a number of responses specifically allow for the addition of appendices to the PICS. A.4 Date of statement A.5 Implementation details The supplier of the protocol implementation shall specify the information necessary to uniquely identify the implementation and the system in which it may reside. This may include details of: a) supplier, implementati
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1