1 Scope, Purpose and Application
1.1 Scope
1.2 Purpose
1.3 Application
2
References
2.1 Normative references
2.2 Informative references
3
Definitions
4
Abbreviations
5
Overview
5.1 Security transformations
5.2 Security information exchange
5.2.1 Security information default values
5.2.2 Negotiation of security algorithms
5.3 Abstract syntax for negotiation of security parameters
5.3.1 Abstract syntax name
6
Model
7
Service overview
7.1 Association services
7.2 STASE-ROSE services
7.3 Relationship to presentation services
7.4 Service definition
7.4.1 Conventions
7.4.2 Association services
7.4.3 SR-TRANSFER service
7.4.4 SR-TRANSFER parameters
8
Interaction between application service elements
8.1 Association establishment
8.1.1 Association initiator
8.1.2 Association responder
8.2 Association release
8.2.1 Sender
8.2.2 Receiver
8.3 Association abort
8.3.1 Sender
8.3.2 Receiver
8.4 Data transfer
8.4.1 Sender
8.4.2 Receiver
9
STASE-ROSE protocol
9.1 Abstract
syntax definition of APDUs
9.2 Abstract syntax name
9.3 Algorithms identifiers
9.4 Application contexts names
9.4.1 Secure TMN context
9.4.2 Secure Directory Application Context
9.5 STASE-ROSE procedures
9.5.1 Transfer
9.6 Mapping of STASE-ROSE services to presentation service
10 Mapping of ROSE services to
STASE-ROSE services
11 Conformance
12 SRPM state tables
12.1 Conventions
12.2 Actions to be taken by SRPM
12.2.1 Invalid intersections
12.2.2 Valid intersections
13
Remote-Operations-Protocol-Machine state tables
Annex A – Secure CMISE
A.1 Application context
A.2 Association establishment rules
A.3 Conformance
A.3.1 Static requirements
A.3.2 Dynamic requirements
Annex B – ASN.1 Syntax defined in this Recommendation
B.1 Abstract syntax for public key authenticator
B.2 Abstract syntax for negotiation of security parameters
B.3 Abstract syntax definition of APDUs
B.4 Abstract syntax object identifier
B.5 Application contexts names
Appendix I – Monotonically increasing time for security
Appendix II – Negotiation of security algorithms example
Appendix III – GSS-API use with STASE-ROSE
III.1 Association Establishment phase
III.2 Data transfer phase