• Available Formats
    • Availability
    • Priced From ( in USD )
    • Secure PDF

      Secure PDF Files

      Secure PDF files include digital rights management (DRM) software. DRM is included at the request of the publisher, as it helps them protect their copyright by restricting file sharing. In order to read a Secure PDF, you will need to install the FileOpen Plug-In on your computer. The FileOpen Plug-In works with Adobe Reader and other viewers. Visit FileOpen to see the full list.

        What you can do with a Secure PDF:
      • Print
      • Search
      • Highlight
      • Bookmark
      Please note that some publishers - including BOMA, IADC and ICML - do not allow printing of their documents.

    • Immediate download
    • $58.00
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $58.00
    • Add to Cart

Customers Who Bought This Also Bought


About This Item


Full Description




General ISO/IEC 10608 is applicable to End Systems concerned with operating in the Open Systems Interconnection (OSI) environment. It specifies a combination of OSI standards which collectively provide the connection-mode Transport Service using the connectionless-mode Network Service.

This part of ISO/IEC 10608 specifies the profile requirements for the provision of security services using cryptographic techniques with the Network Layer Security Protocol connectionless-mode.

This part of ISO/IEC 10608 specifies profile requirements that are applicable to any type of subnetwork.


Position within the Taxonomy The taxonomy of profiles is specified in ISO/IEC TR 10000-2. This part of ISO/IEC ISP 10608 supports security services for any TA profile specified in ISO/IEC ISP 10608 (Connection-mode transport over Connectionless-mode Network Service).

Note: ISO/IEC TR 10000 currently does not identify security sub- profiles. Profiles based on this part of ISO/IEC ISP 10608 may be referred to as TAnnnS1, or TAnnnS1C if confidentiality is selected.


Security Services The following security services are within the scope of this part of ISO/IEC ISP 10608:

a) Data origin authentication b) Connectionless integrity Note: It is strongly recommended that some form of access control is supported. However, this may be achieved using local access control lists which are outside the scope of this ISO/IEC ISP 10608. c) Access control using security labels (optional) d) Connectionless confidentiality (optional) e) Traffic flow confidentiality (optional)


Security Mechanisms This part of ISP 10608 provides no assurance as to the strength of the security mechanisms employed.

This part of ISO/IEC ISP 10608 does not specify the cryptographic algorithms to be employed.