1 Scope
2
Normative references
2.1 Identical Recommendations | International Standards
2.2 Paired Recommendations | International Standards equivalent in
technical content
3
Definitions
3.1 Basic Reference Model definitions
3.2 Security Architecture definitions
3.3 Security Frameworks Overview definitions
3.4 Additional definitions
4
Abbreviations
5
General discussion of Non‑repudiation
5.1 Basic concepts of
Non-repudiation
5.2 Roles of a Trusted Third Party
5.3 Phases of Non‑repudiation
5.4 Some forms of Non-repudiation services
5.5 Examples of OSI Non-repudiation evidence
6
Non‑repudiation policies
7
Information and facilities
7.1 Information
7.2 Non‑repudiation facilities
8
Non‑repudiation mechanisms
8.1 Non-repudiation using a TTP security token (secure envelope)
8.2 Non-repudiation using security tokens and tamper-resistant
modules
8.3 Non-repudiation using a digital signature
8.4 Non-repudiation using Time Stamping
8.5 Non-repudiation using an in-line Trusted Third Party
8.6 Non-repudiation using a Notary
8.7 Threats to Non-repudiation
9
Interactions with other security services and mechanisms
9.1 Authentication
9.2 Access Control
9.3 Confidentiality
9.4 Integrity
9.5 Audit
Annex A – Non-repudiation in OSI Basic Reference Model
Annex B – Non-repudiation Facilities Outline
Annex C – Non‑repudiation in store and forward systems
Annex D – Recovery in a Non-repudiation service
Annex E – Interaction with the Directory
Annex F – Bibliography