BS ISO/IEC 10181-5:1996
Information technology. Open systems interconnection. Security frameworks for open systems Confidentiality framework
Standard number: | BS ISO/IEC 10181-5:1996 |
Pages: | 22 |
Released: | 1997-02-15 |
ISBN: | 0 580 26507 2 |
Status: | Standard |
BS ISO/IEC 10181-5:1996
This standard BS ISO/IEC 10181-5:1996 Information technology. Open systems interconnection. Security frameworks for open systems is classified in these ICS categories:
- 35.100.01 Open systems interconnection in general
This Recommendation | International Standard on Security Frameworks for Open Systems addresses the application of security services in an Open Systems environment, where the term "Open System" is taken to include areas such as Database, Distributed Applications, Open Distributed Processing and OSI. The Security Frameworks are concerned with defining the means of providing protection for systems and objects within systems, and with the interactions between systems. The Security Frameworks are not concerned with the methodology for constructing systems or mechanisms.
The Security Frameworks address both data elements and sequences of operations (but not protocol elements) which may be used to obtain specific security services. These security services may apply to the communicating entities of systems as well as to data exchanged between systems, and to data managed by systems.
This Recommendation | International Standard addresses the confidentiality of information in retrieval, transfer and management. It:
-
defines the basic concepts of confidentiality;
-
identifies possible classes of confidentiality mechanisms;
-
classifies and identifies facilities for each class of confidentiality mechanisms;
-
identifies management required to support the classes of confidentiality mechanism; and
-
addresses the interaction of confidentiality mechanism and the supporting services with other security services and mechanisms.
A number of different types of standards can use this framework, including:
-
standards that incorporate the concept of confidentiality;
-
standards that specify abstract services that include confidentiality;
-
standards that specify uses of a confidentiality service;
-
standards that specify means of providing confidentiality within an open system architecture; and
-
standards that specify confidentiality mechanisms.
Such standards can use this framework as follows:
-
standards of type 1), 2), 3), 4) and 5) can use the terminology of this framework;
-
standards of type 2), 3), 4) and 5) can use the facilities defined in clause 7 of this framework;
-
standards of type 5) can be based upon the classes of mechanism defined in clause 8 of this framework.
As with other security services, confidentiality can only be provided within the context of a defined security policy for a particular application. The definitions of specific security policies are outside the scope of this Recommendation | International Standard.
It is not a matter for this Recommendation | International Standard to specify details of the protocol exchanges which need to be performed in order to achieve confidentiality.
This Recommendation | International Standard does not specify particular mechanisms to support these confidentiality services nor the full details of security management services and protocols. Generic mechanisms to support confidentiality are described in clause 8.
Some of the procedures described in this security framework achieve confidentiality by the application of cryptographic techniques. This framework is not dependent on the use of particular cryptographic or other algorithms, although certain classes of confidentiality mechanisms may depend on particular algorithm properties.
NOTE — Although ISO does not standardize cryptographic algorithms, it does standardize the procedures used to register them in ISO/IEC 9979:1991, Procedures for the registration of criptographic algorithms.
This framework addresses the provision of confidentiality when the information is represented by data that are read-accessible to potential attackers. Its scope includes traffic flow confidentiality.