Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • Secure PDF 🔒
    • Immediate download
    • $94.00
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $94.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

1

Scope

1.1

This Recommendation / International Standard defines an architectural model that provides a basis for: (a) the development of application-independent services and protocols for security in the upper layers of OSI; and (b) the utilization of these services and protocols to fulfill the security requirements of a wide variety of applications, so that the need for application-specific ASEs to contain internal security services is minimized.

1.2

In particular, this Recommendation / International Standard specifies: (a) the security aspects of communication in the upper layers of OSI; (b) the support in the upper layers of the security services de fined in the OSI Security Architecture and the Security Frameworks for Open Systems; (c) the positioning of, and relationships among, security services and mechanisms in the upper layers, according to the guidelines of CCITT Rec. X.800 / ISO 7498-2 and ITU-T Rec. X.207 / ISO/IEC 9545. (d) the interactions among the upper layers, and interactions between the upper layers and the lower layers, in providing and using security services; (e) the requirement for management of security information in the upper layers.

1.3

With respect to access control, the scope of this Recommendation / International Standard includes services and mechanisms for controlling access to OSI resources and resources accessible via OSI.

1.4

This Recommendation / International Standard does not include: (a) definition of OSI services or specification of OSI protocols; (b) specification of security techniques and mechanisms, their operatio n, and their protocol requirements; or (c) aspects of providing security which are not concerned with OSI communications.

1.5

This Recommendation / International Standard is neither an implementation specification for systems nor a basis for appraising the conformance of implementations.

NOTE - The scope of this Recommendation / International Standard includes security for connectionless applications and for distributed applications (such as store-and-forward applicat ions, chained applications, and applications acting on behalf of other applications).