Codes & Standards - Subscribe
CAN/CSA-ISO/IEC 10745-96 (R2014)
This Recommendation / International Standard defines an architectural model that provides a basis for:
(a) the development of application-independent services and protocols for security in the upper layers of OSI; and
(b) the utilization of these services and protocols to fulfill the security requirements of a wide variety of applications, so that the need for application-specific ASEs to contain internal security services is minimized.
In particular, this Recommendation / International Standard specifies:
(a) the security aspects of communication in the upper layers of OSI;
(b) the support in the upper layers of the security services defined in the OSI Security Architecture and the Security Frameworks for Open Systems;
(c) the positioning of, and relationships among, security services and mechanisms in the upper layers, according to the guidelines of CCITT Rec. X.800 / ISO 7498-2 and ITU-T Rec. X.207 / ISO/IEC 9545.
(d) the interactions among the upper layers, and interactions between the upper layers and the lower layers, in providing and using security services;
(e) the requirement for management of security information in the upper layers.
With respect to access control, the scope of this Recommendation / International Standard includes services and mechanisms for controlling access to OSI resources and resources accessible via OSI.
This Recommendation / International Standard does not include:
(a) definition of OSI services or specification of OSI protocols;
(b) specification of security techniques and mechanisms, their operation, and their protocol requirements; or
(c) aspects of providing security which are not concerned with OSI communications.
This Recommendation / International Standard is neither an implementation specification for systems nor a basis for appraising the conformance of implementations.
NOTE - The scope of this Recommendation / International Standard includes security for connectionless applications and for distributed applications (such as store-and-forward applications, chained applications, and applications acting on behalf of other applications).