1 Scope
2 Normative references
2.1 Identical Recommendations | International Standards
2.2 Paired Recommendations | International Standards equivalent in technical content
3 Definitions
3.1 Basic Reference Model definitions
3.2 Security Architecture definitions
3.3 Security Frameworks Overview definitions
3.4 Additional definitions
4 Abbreviations
5 General discussion of Non‑repudiation
5.1 Basic concepts of Non-repudiation
5.2 Roles of a Trusted Third Party
5.3 Phases of Non‑repudiation
5.4 Some forms of Non-repudiation services
5.5 Examples of OSI Non-repudiation evidence
6 Non‑repudiation policies
7 Information and facilities
7.1 Information
7.2 Non‑repudiation facilities
8 Non‑repudiation mechanisms
8.1 Non-repudiation using a TTP security token (secure envelope)
8.2 Non-repudiation using security tokens and tamper-resistant modules
8.3 Non-repudiation using a digital signature
8.4 Non-repudiation using Time Stamping
8.5 Non-repudiation using an in-line Trusted Third Party
8.6 Non-repudiation using a Notary
8.7 Threats to Non-repudiation
9 Interactions with other security services and mechanisms
9.1 Authentication
9.2 Access Control
9.3 Confidentiality
9.4 Integrity
9.5 Audit
Annex A Non-repudiation in OSI Basic Reference Model
Annex B Non-repudiation Facilities Outline
Annex C Non‑repudiation in store and forward systems
Annex D Recovery in a Non-repudiation service
Annex E Interaction with the Directory
Annex F Bibliography