1.
Authentication
Ø
Peer entity authentication
This service is provided for use at the establishment
of, or at times during, the data transfer phase of a connection to confirm the
identities of one or more of the entities connected to one or more of the other
entities.
Ø
Data origin authentication
The data origin authentication service provides the
corroboration of the source of a data unit.
2.
Access control
This protection
service may be applied to various types of access to a resource (e.g.,
the use of a communications resource; the reading, the writing, or the deletion
of an information resource; the execution of a processing resource) or to all
accesses to a resource.
3.
Data confidentiality
Ø
Connection confidentiality
This service provides for the confidentiality of all
(N)-user-data on an (N)-connection.
Ø
Connectionless confidentiality
This service provides for the confidentiality of all
(N)-user-data in a single connectionless (N)-SDU (System Data Unit).
Ø
Selective field confidentiality
This service provides for the confidentiality of
selected fields within the (N)-user-data on an (N)-connection or in a single
connectionless (N)-SDU.
Ø
Traffic flow confidentiality
This service provides for the protection of the
information which might be derived from observation of traffic flows.
4.
Data integrity
Ø
Connection integrity with recovery
This service provides for the integrity of all
(N)-user-data on an (N)-connection and detects any modification, insertion,
deletion or replay of any data within an entire SDU sequence (with recovery
attempted).
Ø
Connection integrity without recovery
Ø
Selective field connection integrity
This service provides for the integrity of selected
fields within the (N)-user data of an (N)-SDU transferred over a connection and
takes the form of determination of whether the selected fields have been
modified, inserted, deleted or replayed.
Ø
Connectionless integrity
This service provides for the integrity of a single
connectionless SDU and may take the form of determination of whether a received
SDU has been modified.
Ø
Selective field connectionless integrity
This service provides for the integrity of selected
fields within a single connectionless SDU and takes the form of determination
of whether the selected fields have been modified.
5.
Non-repudiation
Ø
Non-repudiation with proof of origin
The recipient of data is provided with proof of the
origin of data.
Ø
Non-repudiation with proof of delivery
The sender of data is provided with proof of delivery
of data.
Source : Ebook of Recommendation X.800 page 8-10
Tidak ada komentar:
Posting Komentar