CONTENTS

 1     Scope, Purpose and Application
        1.1     Scope
        1.2     Purpose
        1.3     Application
 2     References
        2.1     Normative references
        2.2     Informative references
 3     Definitions
 4     Abbreviations
 5     Overview
        5.1     Security transformations
        5.2     Security information exchange
                  5.2.1     Security information default values
                  5.2.2     Negotiation of security algorithms
        5.3     Abstract syntax for negotiation of security parameters
                  5.3.1     Abstract syntax name
 6     Model
 7     Service overview
        7.1     Association services
        7.2     STASE-ROSE services
        7.3     Relationship to presentation services
        7.4     Service definition
                  7.4.1     Conventions
                  7.4.2     Association services
                  7.4.3     SR-TRANSFER service
                  7.4.4     SR-TRANSFER parameters
 8     Interaction between application service elements
        8.1     Association establishment
                  8.1.1     Association initiator
                  8.1.2     Association responder
        8.2     Association release
                  8.2.1     Sender
                  8.2.2     Receiver
        8.3     Association abort
                  8.3.1     Sender
                  8.3.2     Receiver
        8.4     Data transfer
                  8.4.1     Sender
                  8.4.2     Receiver
 9     STASE-ROSE protocol
        9.1     Abstract syntax definition of APDUs
        9.2     Abstract syntax name
        9.3     Algorithms identifiers
        9.4     Application contexts names
                  9.4.1     Secure TMN context
                  9.4.2     Secure Directory Application Context
        9.5     STASE-ROSE procedures
                  9.5.1     Transfer
        9.6     Mapping of STASE-ROSE services to presentation service
10     Mapping of ROSE services to STASE-ROSE services
11     Conformance
12     SRPM state tables
       12.1     Conventions
       12.2     Actions to be taken by SRPM
                 12.2.1     Invalid intersections
                 12.2.2     Valid intersections
13     Remote-Operations-Protocol-Machine state tables
Annex A – Secure CMISE
        A.1     Application context
        A.2     Association establishment rules
        A.3     Conformance
                  A.3.1     Static requirements
                  A.3.2     Dynamic requirements
Annex B – ASN.1 Syntax defined in this Recommendation
        B.1     Abstract syntax for public key authenticator
        B.2     Abstract syntax for negotiation of security parameters
        B.3     Abstract syntax definition of APDUs
        B.4     Abstract syntax object identifier
        B.5     Application contexts names
Appendix I – Monotonically increasing time for security
Appendix II – Negotiation of security algorithms example
Appendix III – GSS-API use with STASE-ROSE
      III.1     Association Establishment phase
      III.2     Data transfer phase