35.100.05 多层应用 标准查询与下载



共找到 938 条与 多层应用 相关的标准,共 63

This QOS Framework is a structured collection of concepts and their relationships which describes QOS (Quality of Service) and enables the partitioning of, and relationships between, the topics relevant to QOS in Information Technology (IT) to be expressed by a common means of description. In particular, this QOS Framework is directed at IT systems and their use in providing Open Distributed Processing services. This QOS Framework is intended to assist those designing and specifying IT systems, and those defining communications services and protocols, by providing guidance on QOS applicable to systems, services and resources of various kinds. It describes how QOS can be characterized, how QOS requirements can be specified, and how QOS can be managed. This QOS Framework defines terminology and concepts for QOS in IT. It introduces the concept of QOS characteristics, which represent the fundamental aspects of QOS that are to be managed in various ways; and it defines a number of QOS characteristics of particular importance. These definitions are independent of how QOS is represented or controlled in a real system. This Framework describes how QOS requirements can be expressed, and identifies a number of QOS mechanisms (such as three-party negotiation) that can be used as components of QOS management functions to meet QOS requirements of various kinds. It also describes the circumstances in which various combinations of mechanisms may be appropriate. This QOS Framework provides a basis for the specification of extensions and enhancements to existing or planned standards, as a result of the need for, and application of, the QOS concepts defined in this Recommendation | International Standard. It is not the intent of this Recommendation | International Standard to destabilise any existing Recommendations | International Standards; rather, it is intended that this QOS Framework may be used by: · developers of new or revised IT-related standards which define or use QOS mechanisms; and · IT users expressing requirements for QOS. This QOS Framework does not attempt to provide a basis for the specification of performance objectives or network signalling of QOS in public communications networks. The QOS aspects of these communications services are addressed by other ITU-T Recommendations. The intent of this Recommendation | International Standard is to provide a common vocabulary to both service providers and service users. Nothing in this Recommendation | International Standard should be construed as placing requirements on either service providers or service users. It is hoped that a common approach and vocabulary for QOS will assist multiple service providers to deliver end-to-end QOS to end-systems. This QOS Framework specifically excludes the detailed specification of QOS mechanisms. It is not the intent of this Recommendation | International Standard to serve as an implementation specification, to be a basis for appraising the conformance of implementations, or to define particular services and protocols. Rather, it provides a conceptual and functional framework for QOS which allows independent teams of experts to work productively on the development of Recommendations | International Standards. As applied to OSI, this QOS Framework is consistent with the OSI Basic Reference Model in that it describes operations and mechanisms which are assignable to layers as specified in the OSI Basic Reference Model. It is consistent with the OSI Management Framework (see ITU-T Rec. X.700 | ISO/IEC 7498-4) and the Systems Management Overview (see ITU-T Rec. X.701 | ISO/IEC 10040) in its assignment of functions to management entities. In Annex A, this QOS Framework presents a model of QOS for OSI which identifies the entities that participate in the management of QOS, defines the flow of QOS-related information between them and describes how this information is used.

Information technology - Quality of service: Framework

ICS
35.100.05
CCS
M11
发布
1998-12
实施

The purpose of this part of ISO/IEC TR10000 is to provide principles and a classification scheme for OSI profiles which may be or have been submitted for ratification as International Standardized Profiles (ISPs). ISO/IEC TR 10000-1 defines the concept of profiles which are documented in ISPs. OSI profiles are a subset of OSE profiles. ISO/IEC TR 10000-3 defines the concept of OSE profiles and, along with ISO/IEC TR 10000-1, gives guidance to organizations making proposals for Draft ISPs, on the nature and content of the documents they are producing. The existence of a profile classification in this part of ISO/IEC TR 10000 does not reflect a judgment by ISO/IEC JTC1/SGFS that a profile is required for such capability. It merely provides a capability to identify uniquely such a function and to enable evaluation of PDISPs. Since profiles will be proposed according to needs identified to SGFS and according to the progress of international base standardization, the Taxonomy will be periodically updated or have new parts added in order to reflect the progress reached. It is also recognized that there will be proposals for the extension of the Taxonomy to cover functions which were not identified during preparation of this edition of ISO/IEC TR 10000. These extensions may be identified by a variety of proposers and involve simple extensions to the existing Taxonomy or the addition of new func-tional areas not currently covered by ISO/IEC TR 10000. The inclusion of such extensions is administered following the proce-dures elaborated by SGFS. A distinction has been made between a profile and an ISP documenting one or more profiles. The Taxonomy is only concerned with profiles, but further information is given in the "Directory of ISPs and Profiles contained therein" as to which ISP contains the documentation of a profile. This Directory is maintained as an SGFS standing document SD-4 (see Annex A). For each draft profile submitted to SGFS, it will also provide additional information, including the status of the identified profiles. note: 1 This part of ISO/IEC TR 10000 defines only a taxonomy for OSI based communication profiles; the issue of the placement of other communication profiles is not addressed.

Information technology - Framework and taxonomy of International Standardized Profiles - Part 2: Principles and taxonomy for OSI profiles

ICS
35.100.05
CCS
L70
发布
1998-11
实施

1 General The Directory Standards define various means of authentication between DUAs and DSAs and also between two DSAs. As specified by the Directory Standards, the means of authentication at the time of establishment of an association (i.e. at Bind-time), for DAP, DSP, DOP, and DISP, are: · None-no credentials are supplied · Simple unprotected authentication, with or without password: each authenticating party supplies a name and optionally a password · Simple protected authentication: each authenticating party supplies a name and a password whose information is transmitted in hashed form to preserve password confidentiality and to prevent replay · Strong authentication in which each authenticating party supplies a token signed with a digital signature which can be verified by the other The Directory standards also permit other forms of authentication at the time of association establishment, whereby credentials are passed by "external" elements. Such means are outside the scope of this part of ISO/IEC ISP 15125. In addition, the Directory Standards define a method whereby certain DAP, DSP, or DISP enquiries and results can be authenticated and sealed by means of a digital signature. This part of ISO/IEC ISP 15125 profiles: · Simple unprotected authentication, with or without password, between two DSAs · Simple protected authentication between two DSAs · Strong authentication between two DSAs · Signed DSP and DISP invokes and return-results exchanged between two DSAs It also profiles the behaviour of a DSA in combining signed uncorrelated list and search information as returned by DSP return results. It also profiles the use of the originator element to convey information about the originator of the DAP association within which an operation is created. Since there are many options and possibilities in the use of these techniques, this part of ISO/IEC ISP 15125 does not attempt to specify how each facility shall be used. This results in certain features (e.g. the double-hashing technique described in the last paragraph of [ISO/IEC 9594-8 : 1995 | ITU-T Rec. X.509 (1993)] subclause 6.2) being considered as out-of-scope. DSAs are also permitted to bind to each other using no credentials at all. However, this possibility is outside the scope of this part of ISO/IEC ISP 15125. 2 Position within the taxonomy This part of ISO/IEC ISP 15125 is identified in ISO/IEC TR 10000-2 as "ADY43 — DSA to DSA Authentication". 3 Scenario This part of ISO/IEC ISP 15125 profiles simple and strong authentication between DSAs (BIND dialogue in Figure 1) in the establishment of DSP, DOP and DISP Associations, and signed operations between DSAs (OPERATION dialogue in Figure 1) within these Associations. It also profiles the handling of uncorrelated list and search results (see right-hand-side of diagram) within DSP (there is no analogue for this within DOP and DISP). note: 1 When operations are not signed, authentication from user to DSA occurs only when the DUA binds to a DSA using DAP. Thereafter, the authenticated identity of the originator of an operation is passed from one DSA to another as appropriate. There is no obligation on a receiving DSA to regard the originator value supplied as valid, and in particular, an originator value supplied over a DSP association can be treated as if no authentication had taken place. The Directory Standards also permit DSAs to perform an assessment of "Authentication-Level" to reflect the perceived reliability of the authentication method (9594-2 Subclause 16.4.2.3).

Information technology - International Standardized Profiles ADYnn - OSI Directory - Part 7: ADY43 - DSA to DSA Authentication

ICS
35.100.05
CCS
L79
发布
1998-11
实施

This part of ISO/IEC ISP 15125 profiles the behaviour of a DSA regarding the operation of the Directory System Protocol (DSP) when communicating with another DSA, as an invoker, as a performer, or both. It also profiles the co-ordination of a DSA communication across several associations to perform a particular distributed operation. It also covers the behaviour of DSAs when acting in accordance with the rules of Distributed Operations (although, in this case, the interaction can be by means of returning referrals or continuation references to DUAs using the DAP protocol). The objective of this part of ISO/IEC ISP 15125 is to define capabilities and constraints on support for DSP by DSAs so that DSAs will be able to interwork within the Directory. It therefore profiles the following: · DSAs as DSP invokers in terms of both protocol and functionality · DSAs as DSP performers in terms of both protocol and functionality · DSAs as users over (DAP or DSP) of Referrals and Continuation references · DSAs as users of HOBS (Hierarchical Operational Bindings) and of Shadow Operational Bindings in so far as they affect distributed operations using DSP Conformance to DOP (Directory Operational Protocol) is outside the scope of this part of ISO/IEC ISP 15125. The objective of this part of ISO/IEC ISP 15125 is to ensure that DSAs will be able to interwork within the Directory in two respects: · Correct protocol behaviour · Correct behaviour in respect of the role that each DSA has to play in respect of Distributed Operations Factors outside the scope of this part of ISO/IEC ISP 15125 include, but are not limited to: · DIT structure · The techniques of authentication more rigorous than simple authentication with passwords DSAs that do not support the distributed Directory are outside the scope of this part of ISO/IEC ISP 15125. 2 Position Within the Taxonomy This part of ISO/IEC ISP 15125 is identified in ISO/IEC TR 10000-2 as "ADY22-DSA support of Distributed Operations". It may be combined with other parts of ISO/IEC ISP 15125, or with ISO/IEC ISP 15126-1 specifying the normal use of the directory, and with T-Profiles specifying the OSI connection-mode transport service. 3 Scenario The model used is described in Overview of Concepts, Models, and Services in [ISO/IEC 9594-1 : 1995 | ITU-T Rec. X.500 (1993)]. The specifications of this part of ISO/IEC ISP 15125 apply to both the invoker and the performer roles of DSP, and also to the use of referrals and continuation references over DAP. All protocol aspects of DAP, however, are profiled by ISO/IEC ISP 15125-3. A DSA handles incoming DAP and DSP protocols, and creates chained and multi-chained operations in accordance with defined procedures. note: 1 T-Profiles are relevant to protocol-information and its handling(see 8.14)

Information technology - International Standardized Profiles ADYnn - OSI Directory - Part 4: ADY22 - DSA support of Distributed Operations

ICS
35.100.05
CCS
L79
发布
1998-11
实施

The purpose of this part of ISO/IEC TR 10000 is to provide the context for functional standardiza-tion in support of Open System Environments (OSE). It provides principles and a classification scheme for OSE profiles which may be or have been submitted for ratification as International Standardized Profiles (ISPs). ISO/IEC TR 10000-1 defines the concept of pro-files that are documented as ISPs. This part of ISO/IEC TR 10000 outlines the basic OSE ob-jectives and concepts, and defines an approach and format for OSE profiles specified by Interna-tional Standardized Profiles. It gives guidance to organizations proposing Draft OSE ISPs, on the nature and content of the documents which may be submitted for ratification as International Standardized Profiles. An OSE is defined as a comprehensive set of interfaces, services and supporting formats (including user aspects) enabling interoperability and portability of applications, data or people, as specified by information technology standards and profiles. Communication protocols are part of the specification of behaviour at certain types of interfaces. Each OSE profile is created to satisfy a clearly specified set of user requirements. Since pro-files will be proposed according to needs identi-fied to SGFS and according to the progress of international base standardization, the Taxon-omy will be periodically updated or have new parts added in order to reflect the progress reached. It is also recognized that there will be proposals for the extension of the taxonomy to cover functions which were not identified during the preparation of this edition of ISO/IEC TR 10000. These extensions may be identified by a variety of proposers and involve simple extensions to the existing Taxonomy or the addi-tion of new functional areas not currently covered by ISO/IEC TR 10000. The inclusion of such extensions is administered following the pro-cedures elaborated by SGFS. A distinction has been made between a profile and an ISP which documents one or more pro-files. The Taxonomy is only concerned with profiles, but further information is given in the "Directory of ISPs and Profiles contained therein" as to which ISP contains the documentation of a profile. This Directory is maintained as an SGFS stand-ing document SD-4 (see reference in Annex A). For each draft profile submitted to SGFS, it will also provide additional information, including the status of the identified profiles.

Information technology - Framework and taxonomy of International Standardized Profiles - Part 3: Principles and taxonomy for Open System Environment profiles

ICS
35.100.05
CCS
L70
发布
1998-11
实施

This part of ISO/IECTR 10000 defines the concept of profiles, and the way in which they are documented in International Standardized Profiles. It gives guidance to organizations making proposals for Draft International Standardized Profiles on the nature and content of the documents they are producing. This part of ISO/IEC TR 10000 outlines concepts of profiles and taxonomies (or Classification Schemes), and the format and content of ISPs. Annex A gives details of the format and the content of ISPs as required bylSO/IECJTC1. ISO/IEC TR 10000-2 provides principles and a classifi-cation scheme for OSI profiles which may be or have been submitted for ratification as International Stan-dardized Profiles. NOTE - These OSI profiles specify OSI base standards, and those base standards concerned with interchange formats and data representation which are expected to be used in conjunction with them. ISO/IEC TR 10000-3 provides the context for functional standardization in support of Open System Environ-ments (OSE), and principles and a classification scheme for OSE profiles which may be or have been submitted for ratification as International Standardized Profiles. It outlines the basic OSE objectives and concepts, and defines an approach and format for OSE profiles specified by International Standardized Profiles and, along with this part of ISO/IEC TR 10000, gives guidance to organizations making proposals for Draft ISPs on the nature and content of the documents they produce. Part 2 and Part 3 may be extended for OSI and OSE profiles respectively and further parts of ISO/IEC TR 10000 may be developed to define other classes of profiles. ISO/IEC TR 10000 is applicable to all International Standardized Profiles of ISO and IEC. Its primary focus is the area of competence of ISO/IEC JTC1, but by mutual agreement with JTC 1, other Technical Commit-tees may undertake similar functional standardization activities leading to the inclusion of additional material in this Technical Report.

Information technology - Framework and taxonomy of International Standardized Profiles - Part 1: General principles and documentation framework

ICS
35.100.05
CCS
L70
发布
1998-11
实施

This part of ISO/IEC ISP 12064 specifies an interchange format suitable for transfer of structured documents between equipment designed for raster processing. The documents supported by this part of ISO/IEC ISP 12064 are based on a paradigm of an electronic engineering drawing or llustration. Such documents contain one or more pages. Each page consists of an image in the form of a bkonal raster graphics content There is no restriction on the minimum size of the image. This part of ISO/IEC ISP 12064 allows large format raster documents to be interchanged in a formatted form in accordance with [ITU-T Rec. T.410 series | ISO/IEC 8613]. It is assumed that, when negotiation is performed by the service using this part of ISO/IEC ISP 12064, att non-basic values are subject to negotiation. This part of ISO/IEC ISP 12064 is independent of the processes carried out in an end system to create, edit, or reproduce raster documents. It is also independent of the means to transfer the document which, for example, may be by means of communication links or exchanged storage media. The features of a document that can be interchanged using this part of ISO/IEC ISP 12064 faK into the following categories: a) Page format features - these concern how the layout of each page of a document wi appear when reproduced; b) Raster graphics layout and imaging features - these concern how the document content wi appear within pages of the reproduced document; c) Raster graphics coding - these concern the raster graphics representations and control functions that make up the document raster graphics content There are two DAP object Identifiers supporting this part of ISO/IEC ISP 12064 with the only difference being in the encoding of the data stream. One uses the ASN.1 based ODIF encoding. The other uses the SGML/SDIF based ODL encoding. When this document refers to this part of ISO/IEC ISP 12064, It is referring to this specification regardless of which DAP identifier may be selected to create the data stream.

Information technology - International standardized profile FOD112 - Open document format: image applications - Simple document structure - Raster graphics content architecture - Document application profile (DAP) (ISO/IEC ISP 12064-1:1995)

ICS
35.100.05
CCS
L79
发布
1998-09-15
实施
1998-09-15

The Directory Standards define not only the protocol but also the behaviour of DSAs when they collaborate to carry out the purpose of the Directory. In order to achieve consistency and full interoperability, it is necessary to select from the options and interpretations laid down in the Directory Standards, and in particular within [ISO/IEC 9594-4 | CCITTX.518]. This part of ISO/IEC ISP 10615 specifies the behaviour of DSAs in exercising the DAP, the DSP, or both, that is required to carry out Distributed Operations in accordance with these requirements. The scope of this part of ISO/IEC ISP 10615 is to define: · Static capabilities that are required by DSAs in order to achieve acceptable levels of service in co-operation with other DSAs · Procedures, based on procedures given within the base standards, in the detail required to achieve consistency and interoperability · Protocol use, as required to implement the procedures It is applicable to DSAs implementing the '88 Directory Standards [ISO/IEC 9594:1990 | CCITT X.500:1988]. It applies to all DSAs that contain a component of the distributed Directory, although many of its requirements are inapplicable to DSAs that do not support the invocation of DSP operations. Implementations claiming conformance to this part of ISO/IEC ISP 10615 may be based on either ISO/IEC 9594 or CCITT X.500 or both. There are no practical differences as far as this part of ISO/IEC ISP 10615 is concerned. This part of ISO/IEC ISP 10615 is not free-standing. Compliance with this part of ISO/IEC ISP 10615 requires compliance with ISO/IEC ISP 10615 parts 2 to 4 inclusive, and with normative references identified in those documents. Conversely, this part of the part of ISO/IEC ISP 10615 is applicable to DSAs which conform to other parts of ISO/IEC ISP 10615, and in particular to parts 2 (AD112), 3 (ADI21) and 4 (ADI22). 2 Position within the taxonomy This part of ISO/IEC ISP 10615 is identified in ISO/IEC TR 10000-2 as ADI32 "Directory - Distributed Operations -DSA Support of Distributed Operations". 3 Scenario In the Distributed Directory, one mode of interaction is the chaining (including multicasting) of enquiries in accordance with the procedures laid down in [ISO/IEC 9594-4 | CCITT X.518]. Another is the following of referrals and of embedded continuation references. In carrying out these procedures, a DSA is accessed by a DUA or another DSA, and carries out the requested action with or without reference to other DSAs. This part of ISO/IEC ISP 10615 is concerned with the information contained in a DSA to enable it to determine that other DSAs are involved, and with the procedures whereby other DSAs can be involved, by the use of chaining or referrals (Figure 1).2

Information technology - International standardized profiles ADInn - OSI directory - Part 6: ADI32 - DSA support for distributed operations

ICS
35.100.05
CCS
L79
发布
1998-09
实施

Although ISO/IEC 9594-4 | CCITT X.518 describes the DSA procedures relating to referrals and Search Continuation References, this part of ISO/IEC ISP 10615 does not define the DUA's role in acting upon these procedures. This part of ISO/IEC ISP 10615 specifies the behaviour of DUAs when they use DAP to access multiple DSAs in the course of making a single original enquiry without human intervention in the formulation of protocol. Multiple enquiries result from receiving continuation references embedded in referrals, list results or search results). DUAs which do not have the capability of following referrals or Search Continuation References without human intervention in the formulation of protocol are not within the scope of this part of ISO/IEC ISP 10615 for the purposes of conformance, although its recommendations may be of value. NOTE - The conformance requirements of this part of ISO/IEC ISP 10615 presume the scenario depicted in Figure 1: human intervention (if any) is restricted to the possibility of a "go/no-go" decision; in the case of conformance testing, each such decision is presumed to be "go". The scope of this part of ISO/IEC ISP 10615 is limited to matters of procedure in exercising the DAP protocol, and does not cover enhancements of service. It does not cover any (DAP) protocol encoding issues. NOTE - In the absence of this part of ISO/IEC ISP 10615, the implementor of a DUA with the capability of following continuation references automatically will need to make design decisions about the behaviour of the DUA when doing so. An aim of this part of ISO/IEC ISP 10615 is to minimise uncertainty and enhance consistency in making design solutions by means of functional standardisation. This part of ISO/IEC ISP 10615 adds no spurious complexity, given that the requirement pre-exists to follow continuation references automatically 2 Position within the taxonomy This part of ISO/IEC ISP 10615 is identified in ISO/IEC TR 10000-2 as ADI31 "Directory—Distributed Operations—DUA Support of Distributed Operations". 3 Scenario This part of ISO/IEC ISP 10615 profiles the autonomous behaviour of DUAs when Referrals or Search Continuation References are used by the Directory. A DUA creates an association to a DSA of its choice, and invokes an operation. The DSA may return a referral instead of a result, or the result may contain continuation references. The latter occur in the case of List or Search operations in which the DSA is unwilling or unable to complete the search, but is able to advise which other DSAs may be able to assist. The possible actions which may then be taken by a DUA, without human intervention except possibly the taking of a "go/no-go" decision, are specified in this part of ISO/IEC ISP 10615.

Information technology - International standardized profiles ADInn - OSI directory - Part 5: ADI31 - DUA support for distributed operations

ICS
35.100.05
CCS
L79
发布
1998-09
实施

Information technology - Message handling systems (MHS) - Part 6:protocol specifications

ICS
35.100.05
CCS
发布
1998-08-31
实施

Information technology - Message-handling systems (MHS) - Part 5: Message store: Abstract service definition

ICS
35.100.05
CCS
发布
1998-08-31
实施

本标准是规定使用远程使用者-代理者与讯息转送系统(Message Transfer System, 简称 MTS)间之讯息转送系统的存取协议(P3),以提供存取 CNS 13742-3 〔信息处理系统–抽象服务定义及程序〕 中所定义的 MTS 抽象服务。本标准也规定使用于远程使用者-代理者与讯息储存(Mess

Information technology - Message handling systems (MHS) - Part 6:protocol specifications

ICS
35.100.05
CCS
发布
1998-08-31
实施
1998-08-31

本标准定义讯息储存(Message Store,简称 MS)的抽象服务。抽象服务是由讯息储存接取协议(定义于 CNS 13742-6〔信息技术–讯息处置系统–第 6 部:协议规格〕)、讯息转送系统(Message Transfer System, 简称 MTS)抽象服务(定义 CNS 13742-3 〔信息处理系统–抽象服务

Information technology - Message-handling systems (MHS) - Part 5: Message store: Abstract service definition

ICS
35.100.05
CCS
发布
1998-08-31
实施
1998-08-31

1 General ISO/IEC ISP 10608 is applicable to End Systems concerned with operating in the Open Systems Interconnection (OSI) environment. It specifies a combination of OSI standards which collectively provide the connection-mode Transport Service using the connection-mode Network Service. ISO/IEC ISP 10608-5 specifies subnetwork type dependent requirements for end system operation when the end system is attached to an X.25 packet switched data network by a dedicated (permanent) access line and using virtual calls. This part of ISO/IEC 10608 specifies the profile requirements for the provision of security services using cryptographic techniques with Network Layer Security Protocol connection-mode and SDT-PDU based protection for use with X.25 packet switched data networks as specified in ISO/IEC 10608-5. 2 Position within the Taxonomy The taxonomy of profiles is specified in ISO/IEC TR 10000-2. This part of ISO/IEC ISP 10608 supports security services for TA1111 and TA1121 profiles as specified in ISO/IEC ISP 10608-5. Note: ISO/IEC TR 10000 currently does not identify security sub-profiles. Profiles based on this part of ISO/IEC ISP 10608 may be referred to as TA1 lnlS2, or TA1 lnlS2C if confidentiality is selected. 3 Scenario 4 Security Services The following security services are within the scope of this part of ISO/IEC ISP 10608: a) Peer entity authentication b) Connection integrity without recovery (including replay protection) c) Access control using security labels Note: Where label based access control is not enforced by a system a null label may be employed. d) Connection confidentiality (optional) e) Traffic flow confidentiality (optional) 5 Security Mechanisms This part of ISO/IEC ISP 10608 provides no assurance as to the strength of the security mechanisms employed. This part of ISO/IEC ISP 10608 does not specify the cryptographic algorithms to be employed.

Information technology - International Standardized Profile TAnnnn - Connection-mode transport service over connectionless-mode network service - Part 8: Security employing the network layer security protocol - Connection-mode with SDT-PDU based protectio

ICS
35.100.05
CCS
L79
发布
1998-08
实施

1 General ISO/IEC 10608 is applicable to End Systems concerned with operating in the Open Systems Interconnection (OSI) environment. It specifies a combination of OSI standards which collectively provide the connection-mode Transport Service using the connectionless-mode Network Service. This part of ISO/IEC 10608 specifies the profile requirements for the provision of security services using cryptographic techniques with the Network Layer Security Protocol connectionless-mode. This part of ISO/IEC 10608 specifies profile requirements that are applicable to any type of subnetwork. 2 Position within the Taxonomy The taxonomy of profiles is specified in ISO/IEC TR 10000-2. This part of ISO/IEC ISP 10608 supports security services for any TA profile specified in ISO/IEC ISP 10608 (Connection-mode transport over Connectionless-mode Network Service). Note: ISO/IEC TR 10000 currently does not identify security sub-profiles. Profiles based on this part of ISO/IEC ISP 10608 may be referred to as TAnnnSl, or TAnnnS1C if confidentiality is selected. 3 Scenario Note: The relationship between the Connectionless Mode Network Protocol and Connectionless Mode NLSP is specified in 5.4 4 Security Services The following security services are within the scope of this part of ISO/IEC ISP 10608: a) Data origin authentication b) Connectionless integrity Note: It is strongly recommended that some form of access control is supported. However, this may be achieved using local access control lists which are outside the scope of this ISO/IEC ISP 10608. c) Access control using security labels (optional) d) Connectionless confidentiality (optional) e) Traffic flow confidentiality (optional) 5 Security Mechanisms This part of ISP 10608 provides no assurance as to the strength of the security mechanisms employed. This part of ISO/IEC ISP 10608 does not specify the cryptographic algorithms to be employed.

Information technology - International standardized profile TAnnnn - Connection-mode transport service over connectionless-mode network service - Part 7: Security employing the network layer security protocol - Connectionless-mode for TAnn profiles

ICS
35.100.05
CCS
L79
发布
1998-08
实施

This is Amendment 1 to ISO/IEC ISP 10608-1-1992 (Information technology — International Standardized Profile Tannnn — Connection-mode Transport Service over Connectionless-mode Network Service — Part 1: General overview and subnetwork-independent requirements)

Information technology - International standardized profile TAnnnn - Connection-mode transport service over connectionless-mode network service; Part 1: General overview and subnetwork-independent requirements; Amendment 1: Reference optional security req

ICS
35.100.05
CCS
M11
发布
1998-08
实施

ISO/IEC 10609 is applicable to End Systems concerned with operating in the Open Systems Interconnection (OSI) environment. It specifies a combination of OSI standards which collectively provide the connection-mode Transport Service using the connection-mode Network Service. This part of ISO/IEC 10609 specifies the profile requirements for the provision of security services using cryptographic techniques with Network Layer Security Protocol connection-mode and SDT-PDU based protection. 2 Position within the Taxonomy The taxonomy of profiles is specified in ISO/IEC TR 10000-2. This part of ISO/IEC ISP 10609 supports security services for any TB, TC, TD or TE profile specified in ISO/IEC ISP 10609 (Connection-mode transport over connection-mode Network Service). Note: ISO/IEC TR 10000 currently does not identify security sub-profiles. Profiles based on this part of ISP 10609 may be referred to as TB/C/D/EnnnS2, or TB/C/D/EnnnS2C if confidentiality is selected. 3 Scenario 4 Security Services The following security services are within the scope of this part of ISO/IEC ISP 10609: a) Peer entity authentication b) Connection integrity without recovery (including replay protection) c) Access control using security labels Note: Where label based access control is not enforced by a system a null label may be employed. d) Connection confidentiality (optional) e) Traffic flow confidentiality (optional) 5 Security Mechanisms This part of ISP 10609 provides no assurance as to the strength of the security mechanisms employed. This part of ISO/IEC ISP 10609 does not specify the cryptographic algorithms to be employed.

Information technology - International Standardized Profiles TB, TC, TD and TE - Connection-mode transport service over connection-mode network service - Part 17: Security employing the network layer security protocol - Connection-mode with SDT-PDU based

ICS
35.100.05
CCS
L79
发布
1998-08
实施

ISO/IEC ISP 10613 is applicable to interworking units concerned with operating in the Open Systems Interconnection (OSI) environment. It specifies a combination of OSI base standards that collectively provide a Network Relay function for the connectionless-mode Network Service. This part of ISO/IEC 10613 specifies profile requirements for the provision of security services using cryptographic techniques with the Network Layer Security Protocol connectionless-mode. This part of ISO/IEC 10613 specifies profile requirements that are applicable to any type of subnetwork. 2 Position within the Taxonomy The taxonomy of profiles is specified in ISO/IEC TR 10000-2. This part of ISO/IEC ISP 10613 supports security services for any RA profile specified in ISO/IEC ISP 10613 (profiles relaying the connectionless-mode Network Service). Note: ISO/IEC TR 10000 currently does not identify security sub-profiles. Profiles based on this part of ISP 10613 can be referred to as TAnnnSl, or TAnnnS1C if confidentiality is selected. 3 Scenario Note: The relationship between the Connectionless Mode Network Protocol and Connectionless Mode NLSP is specified in 5.4 4 Security Services The following security services are within the scope of this profile: a) Data origin authentication b) Connectionless integrity Note: It is strongly recommended that some form of access control is supported. However, this may be achieved using local access control lists which are outside the scope of this profile. c) Access control using security labels (optional) d) Connectionless confidentiality (optional) e) Traffic flow confidentiality (optional) 5 Security Mechanisms This part of ISP 10613 provides no assurance as to the strength of the security mechanisms employed. This profile does not specify the cryptographic algorithms to be employed.

Information technology - International Standardized Profile RA - Relaying the connectionless-mode network service - Part 19: Security employing the network layer security protocol - Connectionless-mode, for RAnn.nn profiles

ICS
35.100.05
CCS
L79
发布
1998-08
实施

This is Amendment 1 to ISO/IEC ISP 10609-9-1992 (Information technology — International Standardized Profiles TB, TC, TD and TE — Connection-mode Transport Service over connection-mode Network Service — Part 9: Subnetwork-type dependent requirements for Network Layer, Data Link Layer and Physical Layer concerning permanent access to a packet switched data network using virtualcalls)

Information technology - International Standardized Profiles TB, TC, TD and TE - Connection-mode transport service over connection-mode network service - Part 9: Subnetwork-type dependent requirements for network layer, data link layer and physical layer

ICS
35.100.05
CCS
L79
发布
1998-08
实施

Information technology — International Standardized Profile RA — Relaying the Connectionless-mode Network Service — Part 1: Subnetwork-independent requirements — Amendment 2: Reference optional Securi

ICS
35.100.05
CCS
发布
1998-07-09
实施



Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号