BS ISO/IEC 10181-5:1996
Current
The latest, up-to-date edition.
Information technology. Open systems interconnection. Security frameworks for open systems Confidentiality framework
Hardcopy , PDF
English
02-15-1997
1 Scope
2 Normative references
2.1 Identical Recommendations/International
Standards
2.2 Paired Recommendations/International Standards
equivalent in technical content
3 Definitions
3.1 Basic Reference Model definitions
3.2 Security architecture definitions
3.3 Security frameworks overview definitions
3.4 Additional definitions
4 Abbreviations
5 General discussion of confidentiality
5.1 Basic concepts
5.1.1 Protection of information
5.1.2 Hide and reveal operations
5.2 Classes of confidentiality services
5.3 Types of confidentiality mechanisms
5.4 Threats to confidentiality
5.4.1 Threats when confidentiality is provided
through access prevention
5.4.2 Threats when confidentiality is provided
through information hiding
5.5 Types of confidentiality attacks
6 Confidentiality policies
6.1 Policy expression
6.1.1 Information characteristics
6.1.2 Entity characterization
7 Confidentiality information and facilities
7.1 Confidentiality information
7.1.1 Hiding confidentiality information
7.1.2 Revealing confidentiality information
7.2 Confidentiality facilities
7.2.1 Operation related facilities
7.2.1.1 Hide
7.2.1.2 Reveal
7.2.2 Management related facilities
8 Confidentiality mechanisms
8.1 Confidentiality protection through access
prevention
8.1.1 Confidentiality protection through physical
media protection
8.1.2 Confidentiality protection through routing
control
8.2 Confidentiality provision through encipherment
8.2.1 Confidentiality provision through data
padding
8.2.2 Confidentiality provision through dummy
events
8.2.3 Confidentiality provision through PDU
header protection
8.2.4 Confidentiality provision through time
varying fields
8.3 Confidentiality provision through contextual
location
9 Interactions with other security services and
mechanisms
9.1 Access Control
Annex A - Confidentiality in the OSI Reference Model
Annex B - Example of a sequence of movements through
different confidentiality protected environments
Annex C - Representation of Information
Annex D - Covert Channels
Annex E - Confidentiality Facilities Outline
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.