Table of Contents
1Scope
2References
3Definitions
3.1Termsdefinedelsewhere
3.2TermsdefinedinthisRecommendation
4Abbreviationsandacronyms
5Convention
6TTPservicesforsecureend-to-enddatacommunication
7Systemmodel
8Processesofasecureend-to-enddatacommunication
8.1Establishmentphase
8.2Datatransmissionphase
8.3Terminationphase
9OnlineTTPservicestosupportsecureend-to-enddata
communication
9.1TTPservicesforestablishmentphase
9.2TTPservicesfordatatransmissionphase
9.3TTPservicesforterminationphase
9.4PossibilitiesofonlineTTPservicestosupport
secureend-to-enddatacommunication
9.5IntegrationofTTPservices
10Basicinterfacesforsecureend-to-enddatacommunication
basedononlineTTP
10.1Requester-TTPinterface
10.2Responder-TTPinterface
10.3Requester-Responderinterface
10.4TTPinternalinterface
10.5Requesterinternalinterface
10.6Responderinternalinterface
11Basicinteractionsforsecureend-to-enddatacommunication
basedononlineTTP
11.1Preconditions
11.2Establishmentofcontrolpath
11.3Establishmentofsecuredatacommunicationpath
11.4Securedatatransmission
11.5Audittrailcreation
11.6Terminationofsecuredatacommunicationpath
11.7Terminationofcontrolpath
12Securityconsiderations
12.1Requester-TTPinterface
12.2Responder-TTPinterface
12.3Establishmentofthesecuredatacommunicationpath
betweenentities
12.4Storeddataintheentity
12.5StoreddataintheTTP
AnnexA-Re-establishment
A.1Re-establishmentprocessofasecureend-to-enddata
communication
A.2TTPservicesforre-establishmentprocess
AnnexB-Entitylevelgranularityandcommunicationlevel
granularity
AppendixI-Servicescenario
AppendixII-RelationshipamongthisRecommendation,
ITU-TX.842andtheLibertyAllianceProject
Bibliography Abstract
Describes basic interfaces, interactions and security considerations for secure end-to-end data communication using on-line trusted third party (TTP) services