• BS ISO/IEC 10181-2 : 1996

    Current The latest, up-to-date edition.


    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  01-01-1996

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    1 Scope
    2 Normative references
        2.1 Identical Recommendations/International
        2.2 Paired Recommendations/International Standards
             equivalent in technical content
        2.3 Additional references
    3 Definitions
    4 Abbreviations
    5 General discussion of authentication
        5.1 Basic concepts of authentication
        5.2 Aspects of authentication service
        5.3 Principles used in authentication
        5.4 Phases of authentication
        5.5 Trusted Third Party Involvement
        5.6 Types of principal
        5.7 Human user authentication
        5.8 Types of attack on authentication
    6 Authentication information and facilities
        6.1 Authentication information
        6.2 Facilities
    7 Characteristics of authentication mechanisms
        7.1 Symmetry/Asymmetry
        7.2 Use of cryptographic/Non-cryptographic
        7.3 Types of authentication
    8 Authentication mechanisms
        8.1 Classification by vulnerabilities
        8.2 Initiation of transfer
        8.3 Use of authentication certificates
        8.4 Mutual authentication
        8.5 Summary of class characteristics
        8.6 Classification by configuration
    9 Interactions with other security services/mechanisms
        9.1 Access control
        9.2 Data integrity
        9.3 Data confidentiality
        9.4 Non-repudiation
        9.5 Audit
    Annex A - Human user authentication
    Annex B - Authentication in the OSI Model
    Annex C - Countering replay using unique numbers or
    Annex D - Protection against some forms of attack on
    Annex E - Bibliography
    Annex F - Some specific examples of authentication
    Annex G - Authentication facilities outline

    Abstract - (Show below) - (Hide below)

    Details application of security services in an Open Systems environment, including Database, Distributed Applications, Open Distributed Processing and OSI areas. Does not cover methodology for construction of systems or mechanisms.

    General Product Information - (Show below) - (Hide below)

    Committee IST/-/1
    Development Note Supersedes 91/65460 DC. (07/2005)
    Document Type Standard
    Publisher British Standards Institution
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
    ISO/IEC 9798-4:1999 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
    ISO/IEC 9979:1999 Information technology Security techniques Procedures for the registration of cryptographic algorithms
    ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
    ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription


      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective