BS ISO/IEC 10181-2:1996
Current
The latest, up-to-date edition.
Information technology. Open systems interconnection. Security frameworks for open systems Authentication framework
Hardcopy , PDF
English
15-11-1996
1 Scope
2 Normative references
2.1 Identical Recommendations/International
Standards
2.2 Paired Recommendations/International Standards
equivalent in technical content
2.3 Additional references
3 Definitions
4 Abbreviations
5 General discussion of authentication
5.1 Basic concepts of authentication
5.2 Aspects of authentication service
5.3 Principles used in authentication
5.4 Phases of authentication
5.5 Trusted Third Party Involvement
5.6 Types of principal
5.7 Human user authentication
5.8 Types of attack on authentication
6 Authentication information and facilities
6.1 Authentication information
6.2 Facilities
7 Characteristics of authentication mechanisms
7.1 Symmetry/Asymmetry
7.2 Use of cryptographic/Non-cryptographic
techniques
7.3 Types of authentication
8 Authentication mechanisms
8.1 Classification by vulnerabilities
8.2 Initiation of transfer
8.3 Use of authentication certificates
8.4 Mutual authentication
8.5 Summary of class characteristics
8.6 Classification by configuration
9 Interactions with other security services/mechanisms
9.1 Access control
9.2 Data integrity
9.3 Data confidentiality
9.4 Non-repudiation
9.5 Audit
Annex A - Human user authentication
Annex B - Authentication in the OSI Model
Annex C - Countering replay using unique numbers or
challenges
Annex D - Protection against some forms of attack on
authentication
Annex E - Bibliography
Annex F - Some specific examples of authentication
mechanisms
Annex G - Authentication facilities outline
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.