Table of Contents
1Scope
2Normativereferences
2.1IdenticalRecommendations/InternationalStandards
2.2PairedRecommendations/InternationalStandards
equivalentintechnicalcontent
2.3AdditionalReferences
3Definitions
4Abbreviations
5Generaldiscussionofintegrity
5.1Basicconcepts
5.2Typesofintegrityservices
5.3Typesofintegritymechanisms
5.4Threatstointegrity
5.5Typesofintegrityattacks
6Integritypolicies
6.1Policyexpression
6.1.1Datacharacterization
6.1.2Entitycharacterization
6.1.2.1Identitybasedpolicies
6.1.2.2Rulebasedpolicies
7Integrityinformationandfacilities
7.1Integrityinformation
7.1.1Shieldintegrityinformation
7.1.2Modificationdetectionintegrityinformation
7.1.3Unshieldintegrityinformation
7.2Integrityfacilities
7.2.1Operationalrelatedfacilities
7.2.2Managementrelatedfacilities
8Classificationofintegritymechanisms
8.1Integrityprovisionthroughcryptography
8.1.1Integrityprovisionthroughsealing
8.1.2IntegrityprovisionthroughDigitalSignatures
8.1.3Integrityprovisionthroughenciphermentof
redundantdata
8.2Integrityprovisionthroughcontext
8.2.1DataReplication
8.2.2Pre-agreedcontext
8.3Integrityprovisionthroughdetectionand
acknowledgement
8.4Integrityprovisionthroughprevention
9Interactionswithothersecurityservicesand
mechanisms
9.1AccessControl
9.2Dataoriginauthentication
9.3Confidentiality
AnnexA-IntegrityintheOSIBasicReferenceModel
AnnexB-ExternalDataConsistency
AnnexC-IntegrityFacilitiesOutline Abstract
Addresses the application of security services in and open systems environment, where the term "Open System" is inclusive of areas such as Database, Distributed Applications, Open Distributed Processing and OSI.