Table of Contents
1Scope
2Normativereferences
2.1IdenticalRecommendations/InternationalStandards
2.2PairedRecommendations/InternationalStandards
equivalentintechnicalcontent
3Definitions
3.1BasicReferenceModeldefinitions
3.2SecurityArchitecturedefinitions
3.3SecurityFrameworkOverviewdefinitions
3.4Additionaldefinitions
4Abbreviations
5GeneraldiscussionofNon-repudiation
5.1BasicconceptsofNon-repudiation
5.2RolesofaTrustedThirdParty
5.3PhasesofNon-repudiation
5.4SomeformsofNon-repudiationservices
5.5ExamplesofOSINon-repudiationevidence
6Non-repudiationpolicies
7Informationandfacilities
7.1Information
7.2Non-repudiationfacilities
8Non-repudiationmechanisms
8.1Non-repudiationusingaTTPsecuritytoken
(secureenvelope)
8.2Non-repudiationusingsecuritytokensandtamper-
resistantmodules
8.3Non-repudiationusingadigitalsignature
8.4Non-repudiationusingTimeStamping
8.5Non-repudiationusinganin-lineTrustedThird
Party
8.6Non-repudiationusingaNotary
8.7ThreatstoNon-repudiation
9Interactionswithothersecurityservicesandmechanisms
9.1Authentication
9.2AccessControl
9.3Confidentiality
9.4Integrity
9.5Audit
AnnexA-Non-repudiationinOSIBasicReferenceModel
AnnexB-Non-repudiationFacilitiesOutline
AnnexC-Non-repudiationinstoreandforwardsystems
AnnexD-RecoveryinaNon-repudiationservice
AnnexE-InteractionwiththeDirectory
AnnexF-Bibliography Abstract
Defines a general framework for the provision of non-repudiation services. The goal of the Non-repudiation service is to collect, maintain, make available, and validate irrefutable evidence regarding identification of originators and recipients involved in data transfers.