Table of Contents
1Scope
2Normativereferences
2.1IdenticalRecommendations/InternationalStandards
2.2PairedRecommendations/InternationalStandards
equivalentintechnicalcontent
3Definitions
3.1BasicReferenceModeldefinitions
3.2Securityarchitecturedefinitions
3.3Additionaldefinitions
4Abbreviations
5Notation
6Organization
6.1Part1-Overview
6.2Part2-Authentication
6.3Part3-Accesscontrol
6.4Part4-Non-repudiation
6.5Part5-Confidentiality
6.6Part6-Integrity
6.7Part7-Securityauditandalarms
6.8Keymanagement
7Commonconcepts
7.1Securityinformation
7.2Securitydomain
7.2.1Securitypolicyandsecuritypolicyrules
7.2.2Securitydomainauthority
7.2.3Inter-relationshipsamongsecuritydomains
7.2.4Establishmentofsecureinteractionrules
7.2.5Inter-domainsecurityinformationtransfer
7.3Securitypolicyconsiderationsforspecific
securityservices
7.4Trustedentities
7.5Trust
7.6Trustedthirdparties
8Genericsecurityinformation
8.1Securitylabels
8.2Cryptographiccheckvalues
8.3Securitycertificates
8.3.1Introductiontosecuritycertificates
8.3.2Verificationandchainingofsecurity
certificates
8.3.3Revocationofsecuritycertificates
8.3.4Re-useofsecuritycertificates
8.3.5Securitycertificatestructure
8.4Securitytokens
9Genericsecurityfacilities
9.1Managementrelatedfacilities
9.1.1InstallSI
9.1.2DeinstallSI
9.1.3ChangeSI
9.1.4ValidateSI
9.1.5InvalidateSI
9.1.6Disable/Re-enablesecurityservice
9.1.7Enrol
9.1.8Un-enrol
9.1.9DistributeSI
9.1.10ListSI
9.2Operationalrelatedfacilities
9.2.1Identifytrustedsecurityauthorities
9.2.2Identifysecureinteractionrules
9.2.3AcquireSI
9.2.4GenerateSI
9.2.5VerifySI
10Interactionsbetweensecuritymechanisms
11Denialofserviceandavailability
12Otherrequirements
AnnexA-Someexamplesofprotectionmechanismsforsecurity
certificates
A.1ProtectionusinganOSIcommunicationssecurityservice
A.2Protectionusingaparameterwithinthesecurity
certificate
A.2.1Theauthenticationmethod
A.2.2Thesecretkeymethod
A.2.3Thepublickeymethod
A.2.4Theone-wayfunctionmethod
A.3Protectionoftheinternalandexternalparameters
whileintransit
A.3.1Transferofinternalparameterstotheissuing
securityauthority
A.3.2Transferofexternalparametersamongentities
A.4Useofsecuritycertificatesbysingleentitiesor
bygroupsofentities
A.5Linkingasecuritycertificatewithaccesses
AnnexB-Bibliography Abstract
This part of the security frameworks describes the organization of the security frameworks, defines security concepts which are required in more than one part of the security frameworks, and also defines the inter-relationship of the service and mechanisms identified in other parts of the frameworks.