ITU-T Rec. F.435 (1991) – MESSAGE HANDLING: ELECTRONIC DATA INTERCHANGE MESSAGING SERVICE
FOREWORD
Introduction
1 Scope
2 References
3 Definitions
    3.1 EDI forwarding
    3.2 EDI message
    3.3 EDI messaging user
    3.4 EDI notification
    3.5 EDI message responsibility
4 Abbreviations
5 Conventions
6 EDI messaging service
    6.1 Introduction
    6.2 EDI messaging
    6.3 EDI messaging environment
    6.4 EDI messaging user
7 EDI messaging system
    7.1 Introduction
        7.1.1 EDI user agents
        7.1.2 EDI message store
        7.1.3 Message transfer system
        7.1.4 EDI access units
    7.2 Information flow in the EDIMS
    7.3 EDI messaging service functional model
    7.4 Structure of EDI messages
    7.5 EDI notification
8 EDIM responsibility and forwarding
    8.1 Introduction
    8.2 Forwarding and secondary distribution
    8.3 Case 1: No forwarding
    8.4 Case 2: Content not changed and EDIM responsibility forwarded
    8.5 Case 3: EDIM responsibility not forwarded
9 EDI naming, addressing and use of directory
10 EDI security
11 Intercommunication with physical delivery services
    11.1 Introduction
    11.2 Delivery and notifications
    11.3 Transfer of EDIM responsibility
    11.4 Physical rendition
12 Use of message store for EDI
13 Elements of service
14 Classification of elements of service
    14.1 Basic EDI messaging service
    14.2 EDI messaging service optional user facilities
15 Quality of service
    15.1 EDI message status
    15.2 Support by providers of EDI service
    15.3 Model of delivery and notification times
    15.4 EDI message delivery time targets
    15.5 EDI notification time targets
    15.6 Error protection
    15.7 Availability of service
ANNEX A – Glossary of Terms
A.1 EDI application
A.2 EDI interchange
A.3 EDI message (EDIM)
A.4 EDI message store (EDI-MS)
A.5 EDI messaging (EDIMG)
A.6 EDI messaging environment (EDIME)
A.7 EDI messaging service
A.8 EDI messaging system (EDIMS)
A.9 EDI messaging user (EDIMG user)
A.10 EDI notification (EDIN)
A.11 EDI message responsibility
A.12 EDI security
A.13 EDI user
A.14 EDI user agent (EDI-UA)
A.15 Electronic data interchange (EDI)
A.16 GS
A.17 IEA
A.18 Interchange
A.19 ISA
A.20 MHD
A.21 ST
A.22 STX
A.23 UNA
A.24 UNB
A.25 UNG
A.26 UNH
A.27 UNT
A.28 UNZ
ANNEX B – Definitions of Elements of Service
B.1 application security element EDI.1
B.2 character set EDI.2
B.3 cross reference information EDI.3
B.4 EDI forwarding EDI.4
B.5 EDI message type(s) EDI.5
B.6 EDI notification request EDI.6 PR
B.7 EDI standard indication EDI.7
B.8 EDI message Identification EDI.8
B.9 EDIM responsibility forwarding allowed indication EDI.9 PR
B.10 EDIN receiver EDI.10
B.11 expiry date/time indication EDI.11
B.12 incomplete copy indication EDI.12
B.13 interchange header EDI.13
B.14 multi-part body EDI.14
B.15 non-repudiation of content originated EDI.15
B.16 non-repudiation of content received EDI.16 PR
B.17 non-repudiation of content received request EDI.17 PR
B.18 non-repudiation of EDI notification EDI.18 PR
B.19 non-repudiation of EDI notification request EDI.19 PR
B.20 obsoleting indication EDI.20
B.21 originator indication EDI.21
B.22 proof of content received EDI.22 PR
B.23 proof of content received request EDI.23 PR
B.24 proof of EDI notification EDI.24 PR
B.25 proof of EDI notification request EDI.25 PR
B.26 recipient indication EDI.26 PR
B.27 related message(s) EDI.27
B.28 services indication EDI.28
B.29 stored EDI message auto-forward EDI.29
B.30 typed body EDI.30
ANNEX C – Security Overview
C.1 Introduction
C.2 Vulnerabilities
C.3 Vulnerabilities countered
C.4 Additional pervasive mechanisms
ANNEX D – EDI naming, addressing, and use of directory
D.1 Introduction
D.2 EDI naming
D.3 Suggested DIT structure for EDI
D.4 Name resolution
D.5 Authentication
D.6 Capabilities assessment
ANNEX E – Cross Referencing Overview