GB/T 18794.2-2002
Information technology--Open systems interconnection--Security frameworks for open systems--Part 2: Authentication framework (English Version)

Standard No.
GB/T 18794.2-2002
Language
Chinese, Available in English version
Release Date
2002
Published By
General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China
Latest
GB/T 18794.2-2002
Scope
This standard series on open systems security frameworks deals with the application of security services in an open systems environment. The term "open systems" is meant to include areas such as databases, distributed applications, open distributed processing and OSI. The security framework is mainly used to provide protection methods for systems and objects when interacting within and between systems. Security frameworks do not take into account the methodology used to construct systems or mechanisms. The security framework refers to the data elements and sequences of operations (but not the protocol elements) used to obtain specific security services. These security services are applicable to the communicating entities of the system, as well as to data exchanged between systems and data managed by the system. This standard: - defines the basic concepts of authentication; - identifies possible classes of authentication mechanisms; - defines services for these classes of authentication mechanisms; - identifies the functional requirements of protocols supporting these classes of authentication mechanisms; Identify common management needs. The types of standards that can use this framework include: 1) Standards that conform to the concept of authentication; 2) Standards that provide authentication services; 3) Standards that use authentication services; 4) Standards that specify means to provide authentication within an open system architecture; 5) Specifies the criteria for the authentication mechanism. NOTE: The services in 2), 3) and 4) may include authentication, but may have different intents. The above-mentioned standards can use this framework in the following ways: - standard types 1), 2), 3), 4) and 5) can use the terms of this framework; - standard types 2), 3), 4) and 5) Can use the services defined in Clause 7 of this framework; – standard type j) can be based on the mechanisms defined in Clause 8 of this framework. As with other security services, authentication can only be provided in the context of security policies defined for a particular application. The definition of a security policy is outside the scope of this standard. The scope of this standard does not include the specification of the details of the protocol exchanges that need to be performed to achieve authentication. This International Standard does not specify specific mechanisms for supporting these authentication services. Other standards (such as GB/T 15843) have formulated specific identification methods in more detail. In addition, examples of such methods are incorporated in other standards (such as GB/T 16264.8) in order to address specific identification requirements.

GB/T 18794.2-2002 history

  • 2002 GB/T 18794.2-2002 Information technology--Open systems interconnection--Security frameworks for open systems--Part 2: Authentication framework
Information technology--Open systems interconnection--Security frameworks for open systems--Part 2: Authentication framework

GB/T 18794.2-2002 -All Parts




Copyright ©2024 All Rights Reserved