ETR 097 : 20001
Current
The latest, up-to-date edition.
TERMINAL EQUIPMENT (TE) - SECURITY ARCHITECTURE FOR THE DIRECTORY
Hardcopy , PDF
English
Foreword
1 Introduction
2 References
3 Scope
4 Scenario
5 Conformance requirements
6 Principles
6.1 The Directory Security Model
6.2 Overview
6.3 Threats
6.4 Countering masquerade
6.5 Practical realisation of directory security
6.6 Trust
6.7 Authentication
6.8 Service access
6.9 Access control
6.10 Use of "trust"
7 Additional Security Mechanisms
7.1 Introduction
7.2 Authentication
7.3 Service Access
7.4 Access Control
7.5 Trust lists
7.6 Directory audit
7.7 Physical security
8 Additional recommendations
8.1 Use of the Requester Element in Common Arguments
8.2 Use of non-specific subordinate references
8.3 Pairwise-distinct passwords for DSP authentication
Annex A: Summary of 1992 Access Control
History
Covers various security issues within an X.500 based directory.
Committee |
TE 6
|
DocumentType |
Standard
|
Pages |
22
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.