《GBT18794.1-2002-信息技术开放系统互连开放系统安全框架第1部分概述》.pdf

《GBT18794.1-2002-信息技术开放系统互连开放系统安全框架第1部分概述》.pdf

ID:32007797

大小:922.14 KB

页数:22页

时间:2019-01-30

《GBT18794.1-2002-信息技术开放系统互连开放系统安全框架第1部分概述》.pdf_第1页
《GBT18794.1-2002-信息技术开放系统互连开放系统安全框架第1部分概述》.pdf_第2页
《GBT18794.1-2002-信息技术开放系统互连开放系统安全框架第1部分概述》.pdf_第3页
《GBT18794.1-2002-信息技术开放系统互连开放系统安全框架第1部分概述》.pdf_第4页
《GBT18794.1-2002-信息技术开放系统互连开放系统安全框架第1部分概述》.pdf_第5页
资源描述:

《《GBT18794.1-2002-信息技术开放系统互连开放系统安全框架第1部分概述》.pdf》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库

1、ICS35.100.01L79缚8中华人民共和国国家标准GB/T18794.1-2002iatISO/IEC10181一1:1996信息技术开放系统互连开放系统安全框架第1部分:概述Informationtechnology-OpenSystemsInterconnection-Securityframeworksforopensystems-Part1;Overview2002一07一18发布2002一12一01实施中华人民共和国发布国家质量监督检验检疫总局cB/T187941-2002目次前言·............

2、...........................................................................................................tISO/IEC前言··········································································。·················。·········⋯⋯II引言··················,···········。········

3、·································································,········⋯⋯皿1范围·,·····································································。·····,·············。··················⋯⋯12引用标准···············································。··················

4、···························。··········⋯⋯13术语和定义···············。······························。··········*.········································、··⋯14缩略语··。········································································································⋯⋯

5、45记法·························。·····································。············································⋯⋯46组织结构·································。··················。········································。···········⋯⋯47公共概念·······························

6、··················。。·····················································⋯⋯68通用安全信息··········································。························································一99通用安全设施············································、····························

7、··················。······⋯⋯1210安全机制间的交互···························。。················,··············································一1311拒绝服务和可用性···················。·····“·······························································⋯⋯1412其他需求·····················

8、···。······························。··································,···········⋯⋯14附录A(提示的附录)有关安全证书保护机制的例子·······。··················。·················

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。