PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.100 Open systems interconnection (OSI)>35.100.01 Open systems interconnection in general>BS ISO/IEC 10181-2:1996 Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework
Sponsored link
immediate downloadReleased: 1996-11-15
BS ISO/IEC 10181-2:1996 Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework

BS ISO/IEC 10181-2:1996

Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework

Format
Availability
Price and currency
English Secure PDF
Immediate download
358.80 USD
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
35.88 USD
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
107.64 USD
English Hardcopy
In stock
358.80 USD
Standard number:BS ISO/IEC 10181-2:1996
Pages:48
Released:1996-11-15
ISBN:0 580 26515 3
Status:Standard
DESCRIPTION

BS ISO/IEC 10181-2:1996


This standard BS ISO/IEC 10181-2:1996 Information technology. Open systems interconnection. Security frameworks for open systems is classified in these ICS categories:
  • 35.100.01 Open systems interconnection in general

The series of Recommendations | International Standards on Security Frameworks for Open Systems addresses the application of security services in an Open Systems environment, where the term “Open Systems” is taken to include areas such as Database, Distributed Applications, Open Distributed Processing and OSI. The Security Frameworks are concerned with defining the means of providing protection for systems and objects within systems, and with the interactions between systems. The Security Frameworks are not concerned with the methodology for constructing systems or mechanisms.

The Security Frameworks address both data elements and sequences of operations (but not protocol elements) which are used to obtain specific security services. These security services may apply to the communicating entities of systems as well as to data exchanged between systems, and to data managed by systems.

This Recommendation | International Standard:

  • defines the basic concepts for authentication;

  • identifies the possible classes of authentication mechanisms;

  • defines the services for these classes of authentication mechanism;

  • identifies functional requirements for protocols to support these classes of authentication mechanism; and

  • identifies general management requirements for authentication.

A number of different types of standards can use this framework including:

  1. standards that incorporate the concept of authentication;

  2. standards that provide an authentication service;

  3. standards that use an authentication service;

  4. standards that specify the means to provide authentication within an open system architecture; and

  5. standards that specify authentication mechanisms.

[Note that the service in 2), 3) and 4) might include authentication but may have a different primary purpose.]

These standards can use this framework as follows:

  • standard types 1), 2), 3), 4) and 5) can use the terminology of this framework;

  • standard types 2), 3), 4) and 5) can use the services defined in clause 7 of this framework; and

  • standard types 5) can be based on the mechanisms defined in clause 8 of this framework.

As with other security services, authentication can only be provided within the context of a defined security policy for a particular application. The definitions of security policies are outside the scope of this ITU Recommendation | International Standard.

The scope of this Recommendation | International Standard does not include specification of details of the protocol exchanges which need to be performed in order to achieve authentication.

This Recommendation | International Standard does not specify particular mechanisms to support these authentication services. Other standards (such as ISO/IEC 9798) develop specific authentication methods in greater detail. Furthermore, examples of such methods are incorporated into other standards (such as ITU Rec. X.509 | ISO/IEC 9594-8) in order to address specific authentication requirements.

Some of the procedures described in this framework achieve security by the application of cryptographic techniques. This framework is not dependent on the use of a particular cryptographic or other algorithm, although certain classes of authentication mechanisms may depend on particular algorithm properties, e.g. asymmetric properties.

NOTE Although ISO does not standardize cryptographic algorithms, it does standardize the procedures used to register them in ISO/IEC 9979.