Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 32.376
Word version: 16.0.0
0…
2…
2
References
3
Definitions and abbreviations
4
Solution Set definitions
A
CORBA Solution Set
B
File integrity solution
$
Change History
2
References
3
Definitions and abbreviations
Word‑p. 7
3.1
Definitions
3.2
Abbreviations
4
Solution Set definitions
A
(Normative) CORBA Solution Set
Word‑p. 8
A.1
Architectural features
A.1.1
Principles of IRP Security Services
A.1.2
Request Interceptor
Word‑p. 9
A.1.2.1
Client-side Interceptor
Word‑p. 10
A.1.2.2
Server-side Interceptor
A.1.2.3
Request Interceptor Security Attributes
Word‑p. 11
A.1.3
Security Attributes Service Protocol
A.1.3.1
Security Attribute Service context element
A.1.3.2
CORBA Security Service
Word‑p. 12
A.2
Mapping
A.2.1
RI Solution Mapping
A.2.1.1
Security Attribute Mapping
A.2.2
SAS Solution Mapping
Word‑p. 13
A.2.2.1
Security Attribute Mapping
A.3
Itf-N Security Service Behaviour
Word‑p. 14
A.3.1
Request Interceptor Solution
A.3.1.1
Authentication
A.3.1.2
Authorization
A.3.1.3
Activity Log
A.3.2
Security Attributes Service Solution
Word‑p. 15
A.3.2.1
Authentication
A.3.2.2
Authorization
A.3.2.3
Activity Log
A.4
Solution Set definitions
Word‑p. 16
A.4.1
IDL definition structure
A.4.2
IDL specification "SecurityServiceConstDefs.idl"
Word‑p. 17
A.4.3
IDL specification file "SecurityServiceSystem.idl"
Word‑p. 18
A.5
Authentication mechanism
Word‑p. 19
A.5.1
Basic authentication
A.5.2
Digest authentication
A.5.3
Kerberos and SPKM
A.5.4
OMG CORBA CSIv2 Conformance Level 0 of Security
A.6
Use of OMG specified security service
Word‑p. 20
A.6.1
General
A.6.2
Authentication
A.6.2.1
Transport Layer based method
A.6.2.2
Client Authentication layer based method
Word‑p. 21
A.6.3
Authorization and Access Control
A.6.4
(Message) Integrity and Confidentiality Protection
Word‑p. 22
A.6.5
Quotation from OMG CORBA CSIv2 3 Conformance Levels of Security
B
(Normative) File integrity solution
Word‑p. 25
B.1
Architectural features
B.1.1
Principles of IRP Security Services
B.1.2
XML Signature Recommendation
Word‑p. 26
B.2
Mapping
B.2.1
File integrity solution Mapping
B.2.1.1
Security Attribute Mapping
B.2.1.2
Operation Mapping
B.3
Itf-N Security Service Behaviour
Word‑p. 27
B.3.1
File integrity solution
$
Change History
Word‑p. 28