• There are no items in your cart

BS ISO/IEC 10181-2:1996

Current
Current

The latest, up-to-date edition.

Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

11-15-1996

1 Scope
2 Normative references
    2.1 Identical Recommendations/International
         Standards
    2.2 Paired Recommendations/International Standards
         equivalent in technical content
    2.3 Additional references
3 Definitions
4 Abbreviations
5 General discussion of authentication
    5.1 Basic concepts of authentication
    5.2 Aspects of authentication service
    5.3 Principles used in authentication
    5.4 Phases of authentication
    5.5 Trusted Third Party Involvement
    5.6 Types of principal
    5.7 Human user authentication
    5.8 Types of attack on authentication
6 Authentication information and facilities
    6.1 Authentication information
    6.2 Facilities
7 Characteristics of authentication mechanisms
    7.1 Symmetry/Asymmetry
    7.2 Use of cryptographic/Non-cryptographic
         techniques
    7.3 Types of authentication
8 Authentication mechanisms
    8.1 Classification by vulnerabilities
    8.2 Initiation of transfer
    8.3 Use of authentication certificates
    8.4 Mutual authentication
    8.5 Summary of class characteristics
    8.6 Classification by configuration
9 Interactions with other security services/mechanisms
    9.1 Access control
    9.2 Data integrity
    9.3 Data confidentiality
    9.4 Non-repudiation
    9.5 Audit
Annex A - Human user authentication
Annex B - Authentication in the OSI Model
Annex C - Countering replay using unique numbers or
          challenges
Annex D - Protection against some forms of attack on
          authentication
Annex E - Bibliography
Annex F - Some specific examples of authentication
          mechanisms
Annex G - Authentication facilities outline

Details application of security services in an Open Systems environment, including Database, Distributed Applications, Open Distributed Processing and OSI areas. Does not cover methodology for construction of systems or mechanisms.

The series of Recommendations | International Standards on Security Frameworks for Open Systems addresses the application of security services in an Open Systems environment, where the term “Open Systems?? is taken to include areas such as Database, Distributed Applications, Open Distributed Processing and OSI. The Security Frameworks are concerned with defining the means of providing protection for systems and objects within systems, and with the interactions between systems. The Security Frameworks are not concerned with the methodology for constructing systems or mechanisms. The Security Frameworks address both data elements and sequences of operations (but not protocol elements) which are used to obtain specific security services. These security services may apply to the communicating entities of systems as well as to data exchanged between systems, and to data managed by systems. This Recommendation | International Standard: defines the basic concepts for authentication; identifies the possible classes of authentication mechanisms; defines the services for these classes of authentication mechanism; identifies functional requirements for protocols to support these classes of authentication mechanism; and identifies general management requirements for authentication. A number of different types of standards can use this framework including: standards that incorporate the concept of authentication; standards that provide an authentication service; standards that use an authentication service; standards that specify the means to provide authentication within an open system architecture; and standards that specify authentication mechanisms. [Note that the service in 2), 3) and 4) might include authentication but may have a different primary purpose.] These standards can use this framework as follows: standard types1), 2), 3), 4) and 5) can use the terminology of this framework; standard types2), 3), 4) and 5) can use the services defined in clause7 of this framework; and standard types5) can be based on the mechanisms defined in clause8 of this framework. As with other security services, authentication can only be provided within the context of a defined security policy for a particular application. The definitions of security policies are outside the scope of this ITU Recommendation | International Standard. The scope of this Recommendation | International Standard does not include specification of details of the protocol exchanges which need to be performed in order to achieve authentication. This Recommendation | International Standard does not specify particular mechanisms to support these authentication services. Other standards (such as ISO/IEC9798) develop specific authentication methods in greater detail. Furthermore, examples of such methods are incorporated into other standards (such as ITU Rec. X.509 | ISO/IEC9594-8) in order to address specific authentication requirements. Some of the procedures described in this framework achieve security by the application of cryptographic techniques. This framework is not dependent on the use of a particular cryptographic or other algorithm, although certain classes of authentication mechanisms may depend on particular algorithm properties, e.g. asymmetric properties. NOTE Although ISO does not standardize cryptographic algorithms, it does standardize the procedures used to register them in ISO/IEC9979.

Committee
ICT/1
DevelopmentNote
Supersedes 91/65460 DC. (07/2005)
DocumentType
Standard
Pages
48
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC 10181-2:1996 Identical

ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
ISO/IEC 9798-4:1999 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
ISO/IEC 9979:1999 Information technology Security techniques Procedures for the registration of cryptographic algorithms
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

View more information
US$313.84
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.