PREV | TOP | NEXT

3 Definitions

For the purposes of this Recommendation | International Standard, the following definitions apply.

3.1 Descriptive definitions

This Reference Model makes use of the following term defined in ITU-T Rec. X.200 | ISO/IEC 7498-1:

-- transfer syntax.

This Recommendation | International Standard makes use of the following terms defined in ITU-T Rec. X.811 | ISO/IEC 10181-2:

-- claimant;

-- exchange authentication information;

-- principal;

-- trusted third party.

This Recommendation | International Standard makes use of the following terms defined in ITU-T Rec. X.812 | ISO/IEC 10181-3:

-- access control information;

-- access decision function;

-- access enforcement function;

-- initiator;

-- target.

This Recommendation | International Standard makes use of the following terms defined in ITU-T Rec X.813 | ISO/IEC 10181-4:

-- evidence generator;

-- evidence user;

-- evidence verifier;

-- (non-repudiable data) originator;

-- (non-repudiable data) recipient;

-- non-repudiation evidence;

-- non-repudiation service requester;

-- notary.

This Recommendation | International Standard makes use of the following terms defined in ITU-T Rec. 814 | ISO/IEC 10181-5:

-- confidentiality-protected data;

-- hide;

-- originator;

-- recipient;

-- reveal.

This Recommendation | International Standard makes use of the following terms defined in ITU-T Rec. 815 | ISO/IEC 10181-6:

-- integrity-protected data;

-- originator;

-- recipient;

-- shield;

-- validate.

This Recommendation | International Standard makes use of the following terms defined in ITU-T Rec. X.816 | ISO/IEC 10181-7:

-- alarms collector function;

-- alarm examiner function;

-- audit trail examiner function;

-- audit trail archiver function;

-- audit recorder function;

-- audit trail examiner function;

-- audit trail collector function.

This Recommendation | International Standard makes use of the following terms defined in ISO/IEC 11170-1 Key Management Framework:

-- key generation;

-- key registration;

-- key certification;

-- key deregistration;

-- key distribution;

-- key storage;

-- key archiving;

-- key deletion

This Reference Model makes use of the terms defined in ITU-T Rec. X.902 | ISO/IEC 10746-2 shown in the table in figure 1.

figure1.gif (5079 bytes)

Figure 1 - Terms taken from ITU-T Rec X.902 | ISO/IEC 10746-2

3.2 Abbreviations

ODP Open Distributed Processing.

OSI Open Systems Interconnection.

PREV | TOP | NEXT