CONTENTS

 1     Scope
 2     Normative references
        2.1     Identical Recommendations | International Standards
        2.2     Paired Recommendations | International Standards equivalent in technical content
 3     Definitions
        3.1     Basic Reference Model definitions
        3.2     Security Architecture definitions
        3.3     Security Frameworks Overview definitions
        3.4     Additional definitions
 4     Abbreviations
 5     General discussion of Non‑repudiation
        5.1     Basic concepts of Non-repudiation
        5.2     Roles of a Trusted Third Party
        5.3     Phases of Non‑repudiation
        5.4     Some forms of Non-repudiation services
        5.5     Examples of OSI Non-repudiation evidence
 6     Non‑repudiation policies
 7     Information and facilities
        7.1     Information
        7.2     Non‑repudiation facilities
 8     Non‑repudiation mechanisms
        8.1     Non-repudiation using a TTP security token (secure envelope)
        8.2     Non-repudiation using security tokens and tamper-resistant modules
        8.3     Non-repudiation using a digital signature
        8.4     Non-repudiation using Time Stamping
        8.5     Non-repudiation using an in-line Trusted Third Party
        8.6     Non-repudiation using a Notary
        8.7     Threats to Non-repudiation
 9     Interactions with other security services and mechanisms
        9.1     Authentication
        9.2     Access Control
        9.3     Confidentiality
        9.4     Integrity
        9.5     Audit
Annex A – Non-repudiation in OSI Basic Reference Model
Annex B – Non-repudiation Facilities Outline
Annex C – Non‑repudiation in store and forward systems
Annex D – Recovery in a Non-repudiation service
Annex E – Interaction with the Directory
Annex F – Bibliography