ECMA 206 : 1ED 93
Current
The latest, up-to-date edition.
01-12-2013
1 Scope
2 Conformance
3 References
4 Definitions
4.1 Imported definitions
4.2 New definitions
5 Notational Conventions
6 Acronyms and Abbreviations
7 General Description
7.1 Background
7.2 Introduction to ACM
8 Requirements
8.1 General Requirements
8.2 Identification Requirements
8.3 Security Requirements
8.4 Management Requirements
8.5 User Access Requirements
8.6 Communications Requirements
8.7 Storage Requirements
8.8 Process Requirements
9 Relationship to Other Standards and Recommendations
9.1 Communications Standards
9.2 Security Standards
9.3 Management Standards
9.4 Operating Systems and API Standards
9.5 Architecture Standards
10 Models
10.1 Associations and Contexts
10.2 Levels of Context
10.3 Operations on the Context
10.4 Abstract-Association Negotiation Model
10.5 Nested Association-contexts
10.6 Mapping of ACM to communication standards
10.7 Management of Association Context Management
11 Service Description
11.1 Model of Multiple Exchanges
11.2 Parameters for negotiating the association-context
11.3 How to design and implement context parameters
11.4 Key to parameter tables
11.5 ACM-Initiate
11.6 ACM-Initiate-Continue
11.7 ACM-Initiate-Complete
11.8 ACM-Release
11.9 ACM-Abort
11.10 ACM-Modify
11.11 ACM-Modify-Continue
11.12 ACM-Modify-Complete
12 Protocol Abstract Syntax
13 Protocol Mappings
13.1 Introduction and Principles
13.2 Application Contexts
13.3 ACSE mapping
13.4 ROSE mapping
13.5 Mappings to OSI RPC
14 Protocol State Tables
14.1 States
14.2 Events
14.3 Actions
Annex A (Informative) ACM negotiation protocol example
A.1 Requirements
A.2 Data structure specification
A.3 Example: Association requiring a signed PAC
Annex B (Informative) Relationship to Kerberos version 5
B.1 Introduction
B.2 Kerberos Version 5 Client-Server Protocol
B.3 Mapping of KRB_AP_REQ and KRB_AP_REP
B.4 Mapping of KRB_ERROR
Annex C (Informative) Relationship to GSS-API
C.1 Introduction
C.2 Security Context Establishment
C.3 Security Context Deletion
C.4 Security Context Modification
C.5 GSS-API Output Token
Annex D (Informative) Relationship to OSI-TP
Annex E (Informative) Managed objects
E.1 Introduction
E.2 acmService Class
E.3 abstractAssociation Class
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.