BS ISO/IEC 11577:1995
信息技术.开放式系统互连.网络层安全协议

Information technology - Open systems interconnection - Network layer security protocol


说明:

  • 此图仅显示与当前标准最近的5级引用;
  • 鼠标放置在图上可以看到标题编号;
  • 此图可以通过鼠标滚轮放大或者缩小;
  • 表示标准的节点,可以拖动;
  • 绿色表示标准:BS ISO/IEC 11577:1995 , 绿色、红色表示本平台存在此标准,您可以下载或者购买,灰色表示平台不存在此标准;
  • 箭头终点方向的标准引用了起点方向的标准。

 

 

非常抱歉,我们暂时无法提供预览,您可以试试: 免费下载 BS ISO/IEC 11577:1995 前三页,或者稍后再访问。

点击下载后,生成下载文件时间比较长,请耐心等待......

 



标准号
BS ISO/IEC 11577:1995
发布
1995年
发布单位
英国标准学会
当前最新
BS ISO/IEC 11577:1995
 
 
被代替标准
93/640428 DC:1993
适用范围
This ITU-T Recommendation | International Standard specifies a protocol to be used by End Systems and Intermediate Systems in order to provide security services in the Network layer, which is defined by CCITT Rec. X.213 | ISO/IEC 8348, and ISO 8648. The protocol defined in this ITU-T Recommendation | International Standard is called the Network Layer Security Protocol (NLSP). This ITU-T Recommendation | International Standard specifies: 1) Support for the following security services defined in CCITT Rec. X.800 | ISO 7498-2: a) peer entity authentication; b) data origin authentication; c) access control; d) connection confidentiality; e) connectionless confidentiality; f) traffic flow confidentiality; g) connection integrity without recovery (including Data Unit Integrity, in which individual SDUs on a connection are integrity protected); h) connectionless integrity. 2) The functional requirements for implementations that claim conformance to this ITU-T Recommen-dation | International Standard. The procedures of this protocol are defined in terms of: a) requirements on the cryptographic techniques that can be used in an instance of this protocol; b) requirements on the information carried in the security association used in an instance of communication. Although the degree of protection afforded by some security mechanisms depends on the use of some specific cryptographic techniques, correct operation of this protocol is not dependent on the choice of any particular encipherment or decipherment algorithm. This is a local matter for the communicating systems. Furthermore, neither the choice nor the implementation of a specific security policy are within the scope of this ITU-T Recommendation | International Standard. The choice of a specific security policy, and hence the degree of protection that will be achieved, is left as a local matter among the systems that are using a single instance of secure communications. This ITU-T Recommendation | International Standard does not require that multiple instances of secure communications involving a single open system must use the same security protocol. Annex D provides the PICS proforma for the Network Layer Security Protocol in compliance with the relevant guidance given in ISO/IEC 9646-2.

BS ISO/IEC 11577:1995相似标准


推荐





Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号