CAN/CSA-ISO/IEC ISP 10613-20-01 PDF

CAN/CSA-ISO/IEC ISP 10613-20-01 PDF

Name:
CAN/CSA-ISO/IEC ISP 10613-20-01 PDF

Published Date:
03/26/2001

Status:
Active

Description:

Information Technology - International Standardized Profile RA - Relaying the Connectionless-Mode Network Service - Part 20: Security Employing the Network Layer Security Protocol - Connection-Mode with SDT-PDU Based Protection Over X.25 Packet Switched Data Networks Using Virtual Calls, for RA1111

Publisher:
Canada National Standard/Canadian Standards - ISO/IEC ISP

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$20.4
Need Help?
1

Scope

1.1

General ISO/IEC ISP 10613 is applicable to interworking units concerned with operating in the Open Systems Interconnection (OSI) environment. It specifies a combination of OSI standards that collectively provide a Network Relay function for the connection-mode Network Service.

Part 7 of ISO/IEC ISP 10613 specifies subnetwork type dependent requirements for an interworking unit when attached to an X.25 packet switched data network by a dedicated (permanent) access line and using virtual calls.

This part of ISO/IEC ISP 10613 specifies the profile requirements for the provision of security services using cryptographic techniques with Network Layer Security Protocol connection-mode and SDT-PDU based protection for use with X.25 packet switched data networks as specified in part 7 of 10613.

1.2 Position within the Taxonomy The taxonomy of profiles is specified in ISO/IEC TR 10000-2. This part of ISO/IEC ISP 10613 supports security services for RA1111 and RA1121 profiles as specified in ISO/IEC ISP 10613 part 5.

Note: ISO/IEC TR 10000 currently does not identify security sub- profiles. Profiles based on this part of ISO/IEC ISP 10613 may be referred to as RA11n1S2, or RA11n1S2C if confidentiality is selected.

1.4

Security Services The following security services are within the scope of this profile:

a) Peer entity authentication b) Connection integrity without recovery (including replay protection) c) Access control using security labels Note: Where label based access control is not enforced by a system a null label may be employed. d) Connection confidentiality (optional) e) Traffic flow confidentiality (optional)

1.5

Security Mechanisms This part of ISO/IEC ISP 10613 provides no assurance as to the strength of the security mechanisms employed.

This part of ISO/IEC ISP 10613 does not specify the cryptographic algorithms to be employed.
File Size : 1 file , 2.1 MB
Number of Pages : 13
Published : 03/26/2001

History


Related products


Best-Selling Products

DESTRUCTIVE TESTING METHODS
Published Date: 01/01/2010
$7.5
FLUX CORED ARC WELDING
Published Date: 01/01/2012
$9
GAS METAL ARC WELDING
Published Date: 01/01/2012
$9
GAS TUNGSTEN ARC WELDING
Published Date: 01/01/2012
$9
HIWT DESTRUCTIVE TESTING METHO
Published Date: 01/01/2007
DESTRUCTIVE TESTING METHODS
NONDESTRUCTIVE TESTING METHODS
Published Date: 01/01/2009
$8.4