ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf

上传人:deputyduring120 文档编号:704863 上传时间:2019-01-03 格式:PDF 页数:86 大小:3.49MB
下载 相关 举报
ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf_第1页
第1页 / 共86页
ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf_第2页
第2页 / 共86页
ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf_第3页
第3页 / 共86页
ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf_第4页
第4页 / 共86页
ECMA TR 46-1988 SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK《开放系统中的安全性 一项安全框架》.pdf_第5页
第5页 / 共86页
点击查看更多>>
资源描述

1、ECMA EUROPEAN COMPUTER MAN U FACTURERS ASSOCIATIOR SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK ECMA TR/46 July 1988 Free copies of this document are available from ECMA, European Computer Manufacturers Association 114 Rue du Khne- 1204 Geneva (Switzerland) ECMA EUROPEAN CO YPUTE R MAN U FACTURER S

2、 ASS OC1 ATIOIQ SECURITY IN OPEN SYSTEMS A SECURITY FRAMEWORK ECNIA TR/46 July 1988 Brief History ECMA, IS0 and CCITT are working on standards for distributed applications in an Open System environment. Exampla are the OS1 Reference Model, the work on Open Distributed Processing and the Framework fo

3、r Distributed Office Applications. Security is a major concern in information processing. The security aspects of interconnection have been addressed by IS0 in the work on the OS1 Reference Model (DIS 7498/2, Security Architecture). The purpose of this Technical Report is to provide a Framework for

4、the development of security provisions in the Application Layer. This Framework unifies many views of security needs and of security functionality including notions about end-systems security and therefore it allows a coherent approach to the specification of protocols and protocol elements as neede

5、d to realize secure Open Systems. This Report gives an overview of security needs and of the basic functionality needed to answer these needs. Using a generic building block approach it shows how supportive security applications may be constructed to satisfy a wide range of uses. in doing so this Re

6、port makes extensive use of the concepts developed in ECMA TW42, Framework for Distributed Office Applications as well as in ISO/OSI standards. However, other concepts such as the Object Model of processing used in the work of ECMMC32-TG2 on the Distributed Application Services Environment, may also

7、 be used to describe the security functions developed in this document. This Report is one of a set of Standards and Reports for Open Systems Interconnection. Open Systems Interconnection standards are intended to facilitate homogeneous interconnection between heterogeneous information processing sy

8、stems. This Report is within the framework for the coordination of standards for Open Systems Interconnection which is defined by IS0 7498. This Report is based on the practical experience of ECMA member Companies worldwide and on the results of their active participation in the work of IS0 and CCIT

9、 as well as in national standards bodies in Europe and the USA.lt represents a pragmatic, widely based consensus. This Report emphasises the need for specification of the externally visible and verifiable characteristics needed for the communication of security related information. However, it avoid

10、s placing unnecessary constraints upon the internal design and implementation of information processing system that process and exchange security related information. This Report is oriented towards urgent and well understood needs and supports rapid and effective standardization. It is intended to

11、be capable of extensions to cover future developments in technology and needs. Adopted as an ECMA Technical Report by the General Assembly of June 30, 1988. TABLE OF CONTENTS Page 1. INTRODUffION 1 1.1 Need and Application 1.2 Scope of Security in this Report 1.3 The Application Layer Security Frame

12、work 1.4 References 1.5 Definitions 1 21.1 General Terminology 1.5.2 Specific Terminology 1 S.3 Acronyms 2. REQUIREMENTS 2.1 Requirements on this Report 2.2 Environment Compatibility 2.3 General Security Requirements 2.3.1 User View Of Security 2.3.2 Threats to be addressed 2.3.3 Methods of Attack 2

13、.4 Security Policies and Domains 2.4.1 Security Policy 2.4.2 Security Administration Domains 2.4.3 Cooperation between Security Domains 2.4.4 Levels of Policy 2.4.5 Implementation of Policies 2.5 Functional Security Requirements 2.5.1 Access Control 2.5.2 Resource Protection 2.5.3 Information Protec

14、tion 2.5.4 Security Management 2.6 Implementation Considerations 2.6. I 2.6.2 Cryptography 2.7 Design Requirements Use of Supportive Applications 2.7.1 Separation of Functionality 2.7.2 Distributed Operation 2.7.3 RobustnesdResilience 2.7.4 Selective implementation 2.7.5 Usability 2.7.6 Evaluation a

15、nd Testing 2.7.7 Certification and Accreditation 4 4 7 7 7 8 8 8 9 10 10 10 11 11 12 13 14 14 15 16 17 18 18 19 19 19 19 20 20 20 20 3. SECURITY CONCEPTS AND MODELS 3.1 The Security Domain Concept 3. i .I Introduction 3.1.2 Autonomous Peer Domains 3.1.3 The Security Subdomain 3.1.4 Types of Security

16、 Domain 3.2 The Security Facility Concept 3.2.1 Introduction 4. DETAILED DESCRIPTION OF SECURITY FACILITIES 4.1 Subject Sponsor 4.1.1 Introduction 4.1.2 Functionality 4.1.3 Interaction With Other Facilities 4.1.4 4.1.5 Use of Other Applications 4.1.6 Facility Management 4.1.7 Interactions with Commu

17、nications Layer Management Characteristics of the Subject Sponsor 4.2 Authentication Facility 4.2.1 Introduction 4.2.2 4.2.3 Interactions With other Facilities 4.2.4 4.2.5 Use of Other Applications 4.2.6 Facility Management 4.3 Association Management Facility Functions Of the Authentication Facility

18、 Interactions with Communications Layer Management 4.3.1 Introduction 4.3.2 Functions of Association Management 4.3.3 Interaction With Other Facilities 4.3.4 4.3.5 Interactions With Other Applications 4.3.6 Facility Management Interactions With Communication Layer Management 4.4 Security State Facil

19、ity 4.4.1 Introduction 4.4.2 4.4.3 Interactions with other Facilities 4.4.4 4.4.5 Use Of Other Applications 4.4.6 Facility Management Functions Of the Security State Facility Interactions with Communication Layer Management 4.5 Security Attribute Management Facility 4.5.1 Introduction 4.5.2 Function

20、s Of the Facility 4.5.3 Interactions With other Facilities 4.5.4 4.5.5 Use of Other Applications 4.5.6 Facility Management Interactions with Communications Layer Management 20 20 20 21 21 23 25 25 29 29 29 29 30 30 31 31 31 31 31 32 32 33 33 33 34 34 34 35 35 36 36 36 36 36 36 36 37 37 37 37 38 38 3

21、8 39 39 4.6 Authorization Facility 4.6.1 Introduction 4.6.2 4.6.3 Interactions With other Facilities 4.6.4 4.6.5 Use of Other Applications 4.6.6 Facility Management Functions Of the Authorization Facility Interactions with Communications Layer Management 4.7 Inter-Domain Facility 4.7.1 Introduction

22、4.7.2 4.7.3 Interactions With other Facilities 4.7.4 4.7.5 Use of Other Applications 4.7.6 Facility Management Functions Of the Inter-Domain Facility Interactions with Communication Layer Management 4.8 Security Audit Facility 4.8.1 Introduction 4.8.2 4.8.3 interactions With other Facilities 4.8.4 4

23、.8.5 Use of Other Applications 4.8.6 Facility Management Functions Of The Security Audit Facility Interactions with Communications Layer Management 4.9 Security Recovery Facility 4.9.1 Introduction 4.9.2 Functions Of the Facility 4.9.3 Interactions With other Facilities 4.9.4 4.9.5 Use of Other Appl

24、ications 4.9.6 Facility Management Interactions with Communications Layer Management 4.1 O Cryptographic Support Facility 4. IO. I Introduction 4.10.2 Functions Of The Cryptographic Support Facility 4.10.3 Interactions With other Facilities 4.10.4 Interactions with Communications Layer Management 4.

25、10.5 Use of Other Applications 4.10.6 Facility Management 4.1 1 Facility Interaction Matrix RELATIONSHIP TO THE OS1 REFERENCE MODEL 5.1 5.2 Single Associates Objects 5.3 Security Application Entity Types 6. SUPPORTIVE SECURITY APPLICATIONS 5. Security Facilities and Application Service Elements 6.1

26、6.2 Client and Servers Role in The Distributed Environment 6.2. 1 6.2.2 Client/Server Interaction Within a Supportive Security Application Server/Server Interaction within a Supportive Security Application 39 39 40 40 41 41 41 41 41 41 42 43 43 43 43 43 44 45 45 45 45 46 46 46 46 47 47 47 47 47 48 4

27、8 49 49 49 49 50 50 51 52 53 53 53 53 53 - iv - 6.3 Supportive Security Applications and the OS1 Reference Model 6.4 Supportive Security Application Process Structure 6.5 Service and Management Aspects 7. SECURITY MANAGEMENT 7.1 Operational Security Management 7.1 .I Security Management Functions 7.

28、 I .2 Security Management Structures 7.1.3 Consistency and Synchronization of Security Management 7.2 Security Configuration Management 7.3 Ordering of Security Management 8. CONCLUSION 54 55 55 56 56 56 58 59 59 60 61 APPENDIX A - DETAILED EXAMPLE OF THE USE OF SECURITY FACILITIES IN ELECTRONICAL M

29、AIL 63 APPENDIX B - DISCUSSION OF SECURITY ATTRIBUTES 67 APPENDIX C - MANDATORY VERSUS DISCRETIONARY AUTHORIZATION POLICIES 71 -1- 1. INTRODUCTION In recent years, advances in computing and telecommunications technology have greatly expanded the tools available to all users of data processing system

30、s, irrespective of the field of application. This de- velopment is paralleled by the emergence of facilities for the distributed processing of application tasks, thus giving users great flexibility in the structuring of their systems and in the interaction with other systems. As a consequence, user

31、organizations are becoming more and more dependent on the services provided by their systems. Increasingly, information of high value, possibly critical to the sur- vival of the organization, is placed on computer systems and exchanged over telecommunications fa- cilities. This trend raises the need

32、 for dependable systems that process information securely. This Report defines a Framework for the development of standards that support a wide variety of se- curity requirements in a multi-user, multi-vendor systems environment. Major objectives in the devel- opment of such standards are: - to allo

33、w effective interworking of diverse products - to allow modular, expandable development of products - to facilitate implementation. This report is structured as follows: - Clause 1 (this Clause) gives a general introduction, references and definitions of terms, - Clause 2 gives an overview of securi

34、ty requirements from both the operational and from the func- tional point of view. It also gives implementation considerations and design requirements relevant to the design of secure systems on the basis of this Framework, - Clauses 3, 4, 5 and 6 describe the Security Framework: the Security Domain

35、 concept, the Security Facilities concepts, and the mapping of these concepts to other architectures such as the OS1 Refer- ence Model and the Distributed Office Applications Framework, - Clause 7 describes the management aspects of the security functions introduced in the preceding Clauses. - Claus

36、e 8 gives a summary and conclusions. 1.1 Need and Application Applications may be distributed for various reasons such as sharing of costly resources (e.g a printer) or distributing functionality (e.g. electronic mail services). Standards for Open Systems Interconnection permit the functional compon

37、ents of applications to be distributed over a network. This must be done in a secure fashion that assures that users can depend on the services provided and the information stored and processed. Generally, security refers to a complex of measures of procedural, logical and physical measures aimed at

38、 prevention, detection and correction of certain kinds of misuse e.g. together with the tools to install, operate and maintain these measures. For the purpose of this report “security“ will refer to characteristics of data processing systems that give resistance to attack and misuse, intentional or

39、otherwise. Other aspects of systems security such as reliability, availability and redundancy, are outside the scope of this report. Given the above definition, security addresses not only attacks and threats originating externally, .e. by persons not belonging to the organization operating a given

40、network or system, it also addresses internal attacks and threats coming from known persons. By providing guarantees of integrity and or confidentiality of information, secure systems may be used to perform business transactions in such a manner as not to expose their users to unacceptable liabiliti

41、es. Already, major insurance companies are using higher rates for customers with insecure computer systems. -2- Secure systems may more easily survive system failures because the tools and mechanisms needed to assure the integrity of information are available. More and more computers are linked toge

42、ther in systems that provide a wide variety of services to their users. Such systems are frequently referred to as distributed processing systems because single task may require cooperation between processes executing on several end-systems. This Report pro- vides unifying principles, structuring di

43、stributed security functions and the associated protocols. This allows a secure environment to be created in which other types of applications may be executed. 1.2 Scope of Security in this Report Many different security needs can be met by a common set of secure functions to be provided out- side a

44、pplication processes. These functions will affect the interactions between users and productive applications, and between productive applications and supportive applications. They will also affect the installation, maintenance and management of applications and of the underlying system. These functi

45、ons, their interactions and their management constitute the scope of security in this Report. The level of view addressed in this Report is the level of the “secure environment“.This has close parallels with the concept of Open Distributed Processing. The security requirements of distributed applica

46、tions that are specific to the nature of these applications (e.g. access controls to the objects owned by a given application) are addressed here only to the extent that generally applicable func- tions and their interactions can be identified. Where appropriate, this Framework refers to Security Se

47、rvices defined by the OS1 Reference Model as defined in IS0 149812. 1.3 The Application Layer Security Framework This document describes a Security Framework in terms of Application Layer functions necessary to build secure Open Systems. Figure 1 illustrates the concept of a secure, distributed syst

48、em. To the users and owners, the value represented by computer systems lies mostly in the information residing on these systems and in the application software processing this information. The informa- tion will exist in various forms including files on magnetic media and messages transmitted by ele

49、c- tronic means. In the figure, this information - the application data - is indicated as “Security Objects“. A secure system protects the application data it processes as well as the application software that performs the processing. it protects information from misuse by users and from misuse by applica- tion software. In the figure, users and active applications are indicated as “Security Subjects“. (A passive application is a Security Object). In the Security Framework, the access of Security Subjects to Security Objects is mediated and con- trolled by Security Facilities. This concept

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1