X.400 Message Handling Services
Next:
Introduction
Up:
Network Services Security
Previous:
Issues of Using
X.400 Message Handling Services
Paul Markovitz
Introduction
Cryptography Overview
Symmetric Key Cryptography
Secret Key Distribution
Asymmetric Key Cryptography
Digital Signatures
Public Key Distribution
Using Public-Key Cryptography for Secret Key Distribution
X.400 Overview
Functional Model
Message Structure
Delivery Reporting
Vulnerabilities
Security-relevant Data Structures
Security Label
Asymmetric Token
Public Key Certificates
X.400 Services
Message Security Labelling
Secure Access Management
Peer Entity Authentication
Security Context
Origin Authentication
Message Origin Authentication
Report Origin Authentication
Proof of Submission
Proof of Delivery
Data Integrity
Content Integrity
Message Sequence Integrity
Data Confidentiality
Content Confidentiality
Message Flow Confidentiality
Non-repudiation
Security Management
X.400 Security Limitations
John Barkley
Fri Oct 7 16:17:21 EDT 1994