欢迎来到天天文库
浏览记录
ID:403550
大小:952.49 KB
页数:22页
时间:2017-07-30
《GBT18794.1-2002 信息技术 开放系统互连 开放系统安全框架 第1部分 概述.pdf》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、ICS35.100.01L79缚8中华人民共和国国家标准GB/T18794.1-2002iatISO/IEC10181一1:1996信息技术开放系统互连开放系统安全框架第1部分:概述Informationtechnology-OpenSystemsInterconnection-Securityframeworksforopensystems-Part1;Overview.www.bzxzk.com2002一07一18发布2002一12一01实施.中华人民共和国发布国家质量监督检验检疫总局cB/T187941-2002目次前言·...............
2、........................................................................................................tISO/IEC前言··········································································。·················。·········⋯⋯II引言··················,···········。·····························
3、············································,········⋯⋯皿1范围·,·····································································。·····,·············。··················⋯⋯12引用标准···············································。·············································。··········⋯
4、⋯13术语和定义···············。······························。··········*.········································、··⋯14缩略语··。········································································································⋯⋯45记法·························。···························
5、··········。············································⋯⋯46组织结构·································。··················。········································。···········⋯⋯47公共概念·················································。。·····················································⋯⋯
6、68通用安全信息··········································。························································一99通用安全设施············································、··············································。······⋯⋯1210安全机制间的交互···························。。················,········
7、······································一1311拒绝服务和可用性···················。·····“·······························································⋯⋯1412其他需求························。······························。··································,···········⋯⋯14附录A(提示的附录)有关安全证书保护机制的例子···
8、····。··················。··
此文档下载收益归作者所有