ImageVerifierCode 换一换
格式:PDF , 页数:86 ,大小:3.49MB ,
资源ID:704863      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-704863.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf)为本站会员(deputyduring120)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf

1、ECMA EUROPEAN COMPUTER MAN U FACTURERS ASSOCIATIOR SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK ECMA TR/46 July 1988 Free copies of this document are available from ECMA, European Computer Manufacturers Association 114 Rue du Khne- 1204 Geneva (Switzerland) ECMA EUROPEAN CO YPUTE R MAN U FACTURER S

2、 ASS OC1 ATIOIQ SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK ECNIA TR/46 July 1988 Brief History ECMA, IS0 and CCITT are working on standards for distributed applications in an Open System environment. Exampla are the OS1 Reference Model, the work on Open Distributed Processing and the Framework fo

3、r Distributed Office Applications. Security is a major concern in information processing. The security aspects of interconnection have been addressed by IS0 in the work on the OS1 Reference Model (DIS 7498/2, Security Architecture). The purpose of this Technical Report is to provide a Framework for

4、the development of security provisions in the Application Layer. This Framework unifies many views of security needs and of security functionality including notions about end-systems security and therefore it allows a coherent approach to the specification of protocols and protocol elements as neede

5、d to realize secure Open Systems. This Report gives an overview of security needs and of the basic functionality needed to answer these needs. Using a generic building block approach it shows how supportive security applications may be constructed to satisfy a wide range of uses. in doing so this Re

6、port makes extensive use of the concepts developed in ECMA TW42, Framework for Distributed Office Applications as well as in ISO/OSI standards. However, other concepts such as the Object Model of processing used in the work of ECMMC32-TG2 on the Distributed Application Services Environment, may also

7、 be used to describe the security functions developed in this document. This Report is one of a set of Standards and Reports for Open Systems Interconnection. Open Systems Interconnection standards are intended to facilitate homogeneous interconnection between heterogeneous information processing sy

8、stems. This Report is within the framework for the coordination of standards for Open Systems Interconnection which is defined by IS0 7498. This Report is based on the practical experience of ECMA member Companies worldwide and on the results of their active participation in the work of IS0 and CCIT

9、 as well as in national standards bodies in Europe and the USA.lt represents a pragmatic, widely based consensus. This Report emphasises the need for specification of the externally visible and verifiable characteristics needed for the communication of security related information. However, it avoid

10、s placing unnecessary constraints upon the internal design and implementation of information processing system that process and exchange security related information. This Report is oriented towards urgent and well understood needs and supports rapid and effective standardization. It is intended to

11、be capable of extensions to cover future developments in technology and needs. Adopted as an ECMA Technical Report by the General Assembly of June 30, 1988. TABLE OF CONTENTS Page 1. INTRODUffION 1 1.1 Need and Application 1.2 Scope of Security in this Report 1.3 The Application Layer Security Frame

12、work 1.4 References 1.5 Definitions 1 21.1 General Terminology 1.5.2 Specific Terminology 1 S.3 Acronyms 2. REQUIREMENTS 2.1 Requirements on this Report 2.2 Environment Compatibility 2.3 General Security Requirements 2.3.1 User View Of Security 2.3.2 Threats to be addressed 2.3.3 Methods of Attack 2

13、.4 Security Policies and Domains 2.4.1 Security Policy 2.4.2 Security Administration Domains 2.4.3 Cooperation between Security Domains 2.4.4 Levels of Policy 2.4.5 Implementation of Policies 2.5 Functional Security Requirements 2.5.1 Access Control 2.5.2 Resource Protection 2.5.3 Information Protec

14、tion 2.5.4 Security Management 2.6 Implementation Considerations 2.6. I 2.6.2 Cryptography 2.7 Design Requirements Use of Supportive Applications 2.7.1 Separation of Functionality 2.7.2 Distributed Operation 2.7.3 RobustnesdResilience 2.7.4 Selective implementation 2.7.5 Usability 2.7.6 Evaluation a

15、nd Testing 2.7.7 Certification and Accreditation 4 4 7 7 7 8 8 8 9 10 10 10 11 11 12 13 14 14 15 16 17 18 18 19 19 19 19 20 20 20 20 3. SECURITY CONCEPTS AND MODELS 3.1 The Security Domain Concept 3. i .I Introduction 3.1.2 Autonomous Peer Domains 3.1.3 The Security Subdomain 3.1.4 Types of Security

16、 Domain 3.2 The Security Facility Concept 3.2.1 Introduction 4. DETAILED DESCRIPTION OF SECURITY FACILITIES 4.1 Subject Sponsor 4.1.1 Introduction 4.1.2 Functionality 4.1.3 Interaction With Other Facilities 4.1.4 4.1.5 Use of Other Applications 4.1.6 Facility Management 4.1.7 Interactions with Commu

17、nications Layer Management Characteristics of the Subject Sponsor 4.2 Authentication Facility 4.2.1 Introduction 4.2.2 4.2.3 Interactions With other Facilities 4.2.4 4.2.5 Use of Other Applications 4.2.6 Facility Management 4.3 Association Management Facility Functions Of the Authentication Facility

18、 Interactions with Communications Layer Management 4.3.1 Introduction 4.3.2 Functions of Association Management 4.3.3 Interaction With Other Facilities 4.3.4 4.3.5 Interactions With Other Applications 4.3.6 Facility Management Interactions With Communication Layer Management 4.4 Security State Facil

19、ity 4.4.1 Introduction 4.4.2 4.4.3 Interactions with other Facilities 4.4.4 4.4.5 Use Of Other Applications 4.4.6 Facility Management Functions Of the Security State Facility Interactions with Communication Layer Management 4.5 Security Attribute Management Facility 4.5.1 Introduction 4.5.2 Function

20、s Of the Facility 4.5.3 Interactions With other Facilities 4.5.4 4.5.5 Use of Other Applications 4.5.6 Facility Management Interactions with Communications Layer Management 20 20 20 21 21 23 25 25 29 29 29 29 30 30 31 31 31 31 31 32 32 33 33 33 34 34 34 35 35 36 36 36 36 36 36 36 37 37 37 37 38 38 3

21、8 39 39 4.6 Authorization Facility 4.6.1 Introduction 4.6.2 4.6.3 Interactions With other Facilities 4.6.4 4.6.5 Use of Other Applications 4.6.6 Facility Management Functions Of the Authorization Facility Interactions with Communications Layer Management 4.7 Inter-Domain Facility 4.7.1 Introduction

22、4.7.2 4.7.3 Interactions With other Facilities 4.7.4 4.7.5 Use of Other Applications 4.7.6 Facility Management Functions Of the Inter-Domain Facility Interactions with Communication Layer Management 4.8 Security Audit Facility 4.8.1 Introduction 4.8.2 4.8.3 interactions With other Facilities 4.8.4 4

23、.8.5 Use of Other Applications 4.8.6 Facility Management Functions Of The Security Audit Facility Interactions with Communications Layer Management 4.9 Security Recovery Facility 4.9.1 Introduction 4.9.2 Functions Of the Facility 4.9.3 Interactions With other Facilities 4.9.4 4.9.5 Use of Other Appl

24、ications 4.9.6 Facility Management Interactions with Communications Layer Management 4.1 O Cryptographic Support Facility 4. IO. I Introduction 4.10.2 Functions Of The Cryptographic Support Facility 4.10.3 Interactions With other Facilities 4.10.4 Interactions with Communications Layer Management 4.

25、10.5 Use of Other Applications 4.10.6 Facility Management 4.1 1 Facility Interaction Matrix RELATIONSHIP TO THE OS1 REFERENCE MODEL 5.1 5.2 Single Associates Objects 5.3 Security Application Entity Types 6. SUPPORTIVE SECURITY APPLICATIONS 5. Security Facilities and Application Service Elements 6.1

26、6.2 Client and Servers Role in The Distributed Environment 6.2. 1 6.2.2 Client/Server Interaction Within a Supportive Security Application Server/Server Interaction within a Supportive Security Application 39 39 40 40 41 41 41 41 41 41 42 43 43 43 43 43 44 45 45 45 45 46 46 46 46 47 47 47 47 47 48 4

27、8 49 49 49 49 50 50 51 52 53 53 53 53 53 - iv - 6.3 Supportive Security Applications and the OS1 Reference Model 6.4 Supportive Security Application Process Structure 6.5 Service and Management Aspects 7. SECURITY MANAGEMENT 7.1 Operational Security Management 7.1 .I Security Management Functions 7.

28、 I .2 Security Management Structures 7.1.3 Consistency and Synchronization of Security Management 7.2 Security Configuration Management 7.3 Ordering of Security Management 8. CONCLUSION 54 55 55 56 56 56 58 59 59 60 61 APPENDIX A - DETAILED EXAMPLE OF THE USE OF SECURITY FACILITIES IN ELECTRONICAL M

29、AIL 63 APPENDIX B - DISCUSSION OF SECURITY ATTRIBUTES 67 APPENDIX C - MANDATORY VERSUS DISCRETIONARY AUTHORIZATION POLICIES 71 -1- 1. INTRODUCTION In recent years, advances in computing and telecommunications technology have greatly expanded the tools available to all users of data processing system

30、s, irrespective of the field of application. This de- velopment is paralleled by the emergence of facilities for the distributed processing of application tasks, thus giving users great flexibility in the structuring of their systems and in the interaction with other systems. As a consequence, user

31、organizations are becoming more and more dependent on the services provided by their systems. Increasingly, information of high value, possibly critical to the sur- vival of the organization, is placed on computer systems and exchanged over telecommunications fa- cilities. This trend raises the need

32、 for dependable systems that process information securely. This Report defines a Framework for the development of standards that support a wide variety of se- curity requirements in a multi-user, multi-vendor systems environment. Major objectives in the devel- opment of such standards are: - to allo

33、w effective interworking of diverse products - to allow modular, expandable development of products - to facilitate implementation. This report is structured as follows: - Clause 1 (this Clause) gives a general introduction, references and definitions of terms, - Clause 2 gives an overview of securi

34、ty requirements from both the operational and from the func- tional point of view. It also gives implementation considerations and design requirements relevant to the design of secure systems on the basis of this Framework, - Clauses 3, 4, 5 and 6 describe the Security Framework: the Security Domain

35、 concept, the Security Facilities concepts, and the mapping of these concepts to other architectures such as the OS1 Refer- ence Model and the Distributed Office Applications Framework, - Clause 7 describes the management aspects of the security functions introduced in the preceding Clauses. - Claus

36、e 8 gives a summary and conclusions. 1.1 Need and Application Applications may be distributed for various reasons such as sharing of costly resources (e.g a printer) or distributing functionality (e.g. electronic mail services). Standards for Open Systems Interconnection permit the functional compon

37、ents of applications to be distributed over a network. This must be done in a secure fashion that assures that users can depend on the services provided and the information stored and processed. Generally, security refers to a complex of measures of procedural, logical and physical measures aimed at

38、 prevention, detection and correction of certain kinds of misuse e.g. together with the tools to install, operate and maintain these measures. For the purpose of this report “security“ will refer to characteristics of data processing systems that give resistance to attack and misuse, intentional or

39、otherwise. Other aspects of systems security such as reliability, availability and redundancy, are outside the scope of this report. Given the above definition, security addresses not only attacks and threats originating externally, .e. by persons not belonging to the organization operating a given

40、network or system, it also addresses internal attacks and threats coming from known persons. By providing guarantees of integrity and or confidentiality of information, secure systems may be used to perform business transactions in such a manner as not to expose their users to unacceptable liabiliti

41、es. Already, major insurance companies are using higher rates for customers with insecure computer systems. -2- Secure systems may more easily survive system failures because the tools and mechanisms needed to assure the integrity of information are available. More and more computers are linked toge

42、ther in systems that provide a wide variety of services to their users. Such systems are frequently referred to as distributed processing systems because single task may require cooperation between processes executing on several end-systems. This Report pro- vides unifying principles, structuring di

43、stributed security functions and the associated protocols. This allows a secure environment to be created in which other types of applications may be executed. 1.2 Scope of Security in this Report Many different security needs can be met by a common set of secure functions to be provided out- side a

44、pplication processes. These functions will affect the interactions between users and productive applications, and between productive applications and supportive applications. They will also affect the installation, maintenance and management of applications and of the underlying system. These functi

45、ons, their interactions and their management constitute the scope of security in this Report. The level of view addressed in this Report is the level of the “secure environment“.This has close parallels with the concept of Open Distributed Processing. The security requirements of distributed applica

46、tions that are specific to the nature of these applications (e.g. access controls to the objects owned by a given application) are addressed here only to the extent that generally applicable func- tions and their interactions can be identified. Where appropriate, this Framework refers to Security Se

47、rvices defined by the OS1 Reference Model as defined in IS0 149812. 1.3 The Application Layer Security Framework This document describes a Security Framework in terms of Application Layer functions necessary to build secure Open Systems. Figure 1 illustrates the concept of a secure, distributed syst

48、em. To the users and owners, the value represented by computer systems lies mostly in the information residing on these systems and in the application software processing this information. The informa- tion will exist in various forms including files on magnetic media and messages transmitted by ele

49、c- tronic means. In the figure, this information - the application data - is indicated as “Security Objects“. A secure system protects the application data it processes as well as the application software that performs the processing. it protects information from misuse by users and from misuse by applica- tion software. In the figure, users and active applications are indicated as “Security Subjects“. (A passive application is a Security Object). In the Security Framework, the access of Security Subjects to Security Objects is mediated and con- trolled by Security Facilities. This concept

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1