ITU X.811:1995

ITU X.811:1995 Information Technology - Open Systems Interconnection - Security Frameworks For Open Systems: Authentication Framework This recommendation defines basic concepts for authentication, identifies the possible classes of authentication mechanisms, defines the services for these classes of authentication mechanism, identif

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$17.50 tax incl.

$39.77 tax incl.

(price reduced by 56 %)

1000 items in stock

Table of Contents

Introduction
1Scope
2Normativereferences
2.1IdenticalRecommendations/InternationalStandards
2.2PairedRecommendations/InternationalStandards
equivalentintechnicalcontent
2.3Additionalreferences
3Definitions
4Abbreviations
5Generaldiscussionofauthentication
5.1Basicconceptsofauthentication
5.2Aspectsofauthenticationservice
5.3Principlesusedinauthentication
5.4Phasesofauthentication
5.5TrustedThirdPartyInvolvement
5.6Typesofprincipal
5.7Humanuserauthentication
5.8Typesofattackonauthentication
6Authenticationinformationandfacilities
6.1Authenticationinformation
6.2Facilities
7Characteristicsofauthenticationmechanisms
7.1Symmetry/Asymmetry
7.2Userofcryptographic/Non-cryptographictechniques
7.3Typesofauthentication
8Authenticationmechanisms
8.1Classificationbyvulnerabilities
8.2Initiationoftransfer
8.3Useofauthenticationcertificates
8.4Mutualauthentication
8.5Summaryofclasscharacteristics
8.6Classificationbyconfiguration
9Interactionswithothersecurityservices/mechanisms
9.1Accesscontrol
9.2Dataintegrity
9.3Dataconfidentiality
9.4Non-repudiation
9.5Audit
AnnexA-Humanuserauthentication
AnnexB-AuthenticationintheOSIModel
AnnexC-Counteringreplayusinguniquenumbersor
challenges
AnnexD-Protectionagainstsomeformsofattackon
authentication
AnnexE-Bibliography
AnnexF-Somespecificexamplesofauthentication
mechanisms
AnnexG-Authenticationfacilitiesoutline

Abstract

This recommendation defines basic concepts for authentication, identifies the possible classes of authentication mechanisms, defines the services for these classes of authentication mechanism, identifies functional requirements for protocols to support these classes of authentication mechanism, and also identifies general management requirements for authentication.

Contact us