ImageVerifierCode 换一换
格式:PDF , 页数:49 ,大小:2.75MB ,
资源ID:805743      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-805743.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T X 800-1991 Security Architecture for Open Systems Interconnection for CCITT Applications (Study Group VII) 49 pp《CCIT开放网络互连安全结构研究组7 49pp》.pdf)为本站会员(王申宇)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T X 800-1991 Security Architecture for Open Systems Interconnection for CCITT Applications (Study Group VII) 49 pp《CCIT开放网络互连安全结构研究组7 49pp》.pdf

1、INTERNATIONAL TELECOMMUNICATION UNION CCITT X.800 THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMM ITTEE DATA COMMUNICATION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS SECURITY ARCHITECTURE FOR OPEN SYSTEMS INTERCONNECTION FOR CCITT APPLICATIONS Reco

2、mmendation X.800 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesCCITT RECMN*X=8OQ 91 m 4862593 0563723 8 m INTERNATIONAL TELECOMMUNICATION UNION CCITT THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONS U LTATIVE COM M ITTE E DATA COMMUNICA

3、TION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS SECURITY ARCHITECTURE FOR OPEN SYSTEMS INTERCONNECTION FOR CCITT APPLICATIONS Recommendation X.800 I Geneva, 1991 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Han

4、dling ServicesCCITT RECMN*X=BOO 91 4862593 05b3724T- FOREWORD The CCJIT (the International Telegraph and Telephone Consultative Committee) is a permanent organ of the International Telecommunication Union (ITU). CC is responsible for studying technical, operating and tariff questions and issuing Rec

5、ommendations on them with a view to standardizing telecommunications on a worldwide basis. The Plenary Assembly of CC which meets every four years, establishes the topics for study and approves Recommendations prepared by its Study Groups. The approval of Recommendations by the members of CCIT betwe

6、en Plenary Assemblies is covered by the procedure laid down in CCIIT Resolution No. 2 (Melbourne, 1988). Recommendation X.800 was prepared by Study Group VI1 and was approved under the Resolution No. 2 procedure on the 22nd of March 1991. CCIIT NOTE In this Recommendation, the expression “Administra

7、tion” is used for conciseness to indicate both a telecommunication Administration and a recognized private operating agency. o ITU 1991 All rights reserved. No part of ihis-publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and mic

8、rofilm, without permission in writing from the ITU. COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesRecommendation X.800 SECURITY ARCHITECTRE FOR OPEN SYSTEMS INTERCONNECIION FOR CCITT APPLICATIONS O Introduction Recommendation X.200 de

9、scribes the Reference Model for open systems interconnection (OSI). It establishes a framework for coordinating the development of existing and future Recommendations for the interconnection of systems. The objective of OS1 is to permit the interconnection of heterogeneous computer systems so that u

10、seful communication between application processes may be achieved. At various times, security controls must be established in order to protect the information exchanged between the application processes. Such controls should make the cost of improperly obtaining or modifying data greater than the po

11、tential value of so doing, or make the time required to obtain the data improperly so great that the value of the data is lost. This Recommendation defines the general security-related architectural elements which can be applied appropriately in the circumstances for which protection of communicatio

12、n between open systems is required. It establishes, within the framework of the Reference Model, guidelines and consraints to improve existing Recornmendations or to develop new Recommendations in the context of OS1 in order to allow secure communications and thus provide a consistent approach to se

13、curity in OSI. A background in security will be helpful in understanding this Recommendation. The reader who is not well versed in security is advised to read Annex A first. This Recommendation extends the Reference Model (Recommendation X.200) to cover security aspects which are general architectur

14、ai elements of communications protocols, but which are not discussed in the Reference Model. 1 Scope aud field of application This Recommendation: a) b) This Recommendation extends the field of application of Recommendation X.200, to cover secure communications between open systems. Basic security s

15、ervices and mechanisms and their appropriate placement have been identified for all layers of the Reference Model. In addition, the architecturai relationships of the security services and mechanisms to the Reference Model have been identified. Additional security measures may be needed in end syste

16、ms, installations and organizations. These measures apply in various application contexts. The definition of security services need4 to support such additional security measures is outside the scope of the Recornmendation. provides a general description of security services and related mechanisms, w

17、hich may be provided by the Reference Model; and defines the positions within the Reference Model where the services and mechanisms may be provided. 1 Recommendation X.800 and IS0 7498-2 (Information processing systems - Open systems interconnection - Basic Reference Made1 -Part 2: Security architec

18、ture) are technically aligned. Recommendation X.800 1 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling Services-CCITT RECMN%X=800 71 m 4862593 05b3726 3 m OS1 security functions are concerned only with those visible aspects of a communications p

19、ath which permit end systems to achieve the secure transfer of information between them. OS1 security is not concerned with security measures needed in end systems, installations, and organizations, except where these have implications on the choice and position of security services visible in OSI.

20、These latter aspects of security may be standardized but not within the scope of OS1 Recommendations. This Recommendation adds to the concepts and principles defined in Recommendation X.200; it does not modify them. It is not an implementation specification, nor is it a basis for appraising the conf

21、ormance of actual implementations. 2 References Rec. X.200 -Reference Model of open systems interconnection for CCIT applications. IS0 7498 - Information processing systems - Open systems interconnection - Basic Reference Model (1984). IS0 7498-4 - Information processing systems - Open systems inter

22、connection - Basic Reference Model - Part 4: Management framework (1989). IS0 7498/AD1- Information processing systems -Open systems interconnection - Basic Reference Model - Addendum 1: Connectionless-mode transmission (1987). IS0 8648 - Information processing systems - Open systems interconnection

23、 - Internal organization of the network layer (1988). 3 Definitions and abbreviations 3.1 following terms defined in it: This Recommendation builds on concepts developed in Recommendation X.200 and makes use of the a) (N)-connection; b) (N)-data-transmission; c) 0-entity; d) 0-facility; e) 0-layer;

24、f) Open system; g) Peer entities; h) 0-protocol; j) 0-protocol-data-unit; k) Orelay; 1) Routing; m) Sequencing; n) (N)-service; p) (N)-semice-daia-unit; q) (N)-user-data; r) Sub-network; s) OS1 resource; and t) Transfer syntax. 2 Recommendation X.800 COPYRIGHT International Telecommunications Union/

25、ITU TelecommunicationsLicensed by Information Handling Services3.2 standards: This Recommendation uses the foilowing terms drawn from the respective Recommendations/Intemational Connectionless-mode transmission (IS0 7498/AD 1) End system (Rec. X.20O/ISO 7498) Relaying and routing function (IS0 8648)

26、 Management information base (MIB) (IS0 74984) In addition, the following abbreviations are used. OS1 open systems interconnection; SDU for service data unit; SMiB for security management information base; and MIB for management information base. 3.3 For the purpose of this Recommendation, the follo

27、wing definitions apply: 3.3.1 access control The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner. 3.3.2 access control iist A list of entities, together with their access rights, which are authorized to have access to a resource.

28、3.3.3 accountability The property that ensures that the actions of an entity may be traced uniquely to the entity. 3.3.4 active threat The threat of a deliberate unauthorized change to the state of the system. Note - Examples of security-relevant active threats may be: modification of messages, repl

29、ay of messages, insertion of spurious messages, masquerading as an authorized entity and denial of service. 3.3.5 audit See security audit. 3.3.6 audit trail See security audit trail. 3.3.7 authentication See data origin authentication, and peer entity authentication. Note - In this Recommendation t

30、he term “authentication” is not used in connection with data integrity; the term “data integrity” is used instead. 3.3.8 authen tication information Information used to establish the validity of a claimed identity. 3.3.9 authentication exchange A mechanism intended to ensure the identity of an entit

31、y by means of information exchange. Recommendation X.800 3 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesCCITT RECflN*X.BOO 91 4862571 05b3728 7 3.3.10 authorization The granting of rights, which includes the granting of access based

32、on access rights. 3.3.1 1 availability The property of being accessible and useable upon demand by an authorized entity. 3.3.12 capability A token used as an identifier for a resource such that possession of the token confers access rights for the resource. 3.3.13 channel An information transfer pat

33、h. 3.3.14 ciphertext Data produced through the use of encipherment. The semantic content of the resulting data is not available. Note - Ciphertext may itself be input to encipherment, such that super-enciphered output is produced. 3.3.15 cleartext Intelligible data, the semantic content of which is

34、available. 3.3.16 confidentiality The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. 3.3.17 credentials Data that is transferred to establish the claimed identity of an entity. 3.3.18 cryptanalysis sensitive data including cleartext.

35、 The analysis of a cryptographic system and/or its inputs and outputs to derive confidential variables and/or 3.3.19 cryptographic checkvalue unit. Information which is derived by performing a cryptographic transformation (see cryptography) on the data Note - The derivation of the checkvalue may be

36、performed in one or more steps and is a result of a mathematical function of the key and a data unit. It is usually used to check the integrity of a data unit. 3.3.20 cryptography its information content, prevent its undetected modification and/or prevent its unauthorized us. The discipline which em

37、bodies principles, means, and methods for the transformation of data in order to hide Note - Cryptography determines the methods used in encipherment and decipherment. An attack on a cryptographic principle, means, or method is cryptanalysis. 3.3.21 data integrity The property that data has not been

38、 altered or destroyed in an unauthorized manner. 3.3.22 data orwn authentication The corroboration that the source of data received is as claimed. 4 Recommendation X.800 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling Services3.3.23 deciphermen

39、t The reversal of a corresponding reversible encipherment. 3.3.24 decryption See decipherment. 3.3.25 denial of service The prevention of authorized access to resources or the delaying of time-critical operations. 3.3.26 digital signature of the data unit to prove the source and integrity of the dat

40、a unit and protect against forgery e.g. by the recipient. 3.3.27 encipherment Data appended to, or a cryptographic transformation (see cryptography) of a data unit that allows a recipient The cryptographic transformation of data (see cryptography) to produce ciphertext. Note - Encipherment may be ir

41、reversible, in which case the corresponding decipherment process cannot feasibly be performed. 3.3.28 encryption See encipherment. 3.3.29 end-to-end encipherment only within or at the destinaiion end system. (See also link-by-link encipherment.) 3.3.30 identity-based security policy Encipherment of

42、data within or at the source end system, with the corresponding decipherment occurring A security policy based on the identities and/or attributes of users, a group of users, or entities acting on behalf of the users and the resources/objects being accessed. 3.3.31 integrity See data integrity. 3.3.

43、32 key A sequence of symbols that controls the operations of encipherment and decipherment. 3.3.33 key management The generation, storage, distribution, deletion, archiving and application of keys in accordance With a security policy. 3.3.34 link-by-link encipherment The individual application of en

44、cipherment to data on each link of a communications system, (See also end- Note -The implication of link-by-link encipherment is that data will be in cleartext form in relay entities. to-end encipherment.) 3.3.35 manipulation detection A mechanism which is used to detect whether a data unit has been

45、 modified (either accidentally or intentionally). 3.3.36 masquerade The pretence by an entity to be a different entity. Recommendation X.800 5 COPYRIGHT International Telecommunications Union/ITU TelecommunicationsLicensed by Information Handling ServicesCCITT RECMN*X.BOO 71 4862593 05637305 3.3.37

46、notarization The registration of data with a trusted third party that allows the later assurance of the accuracy of its characteristics such as content, origin, time and delivery. 3.3.38 passive threat The threat of unauthorized disclosure of information without changing the state of the system. 3.3

47、.39 password Confidential authentication information, usually composed of a smng of characters. 3.3.40 peer-entity authentication The corroboration that a peer entity in an association is the one claimed. 3.3.41 physical security The measures used to provide physical protection of resources against

48、deliberate and accidental threats. 3.3.42 policy See security policy. 3.3.43 privacy The right of individuals to control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed. Note - Because this term relates to the right

49、of individuals, it cannot be very precise and its use should be avoided except as a motivation for reqiring security. 3.3.44 repudiation Denial by one of the entities involved in a communication of having participated in all or pata of the communication. 3.3.45 routing control The application of rules during the process of routing so as to chose or avoid specific networks, links or relays. 3.3.46 rule-based security policy A security policy based on global rules imposed for all users. These rules usually rely on a comparison of the sensitivity of the resources being accessed a

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1