�1���� Scope
�2����
Normative references
������� 2.1���� Identical Recommendations | International Standards
������� 2.2���� Paired Recommendations | International Standards equivalent in
technical content
�3����
Definitions
������� 3.1���� Basic Reference Model definitions
������� 3.2���� Security Architecture definitions
������� 3.3���� Security Frameworks Overview definitions
������� 3.4���� Additional definitions
�4����
Abbreviations
�5����
General discussion of Non‑repudiation
������� 5.1��� �Basic concepts of
Non-repudiation
������� 5.2���� Roles of a Trusted Third Party
������� 5.3���� Phases of Non‑repudiation
������� 5.4���� Some forms of Non-repudiation services
������� 5.5���� Examples of OSI Non-repudiation evidence
�6����
Non‑repudiation policies
�7����
Information and facilities
������� 7.1���� Information
������� 7.2���� Non‑repudiation facilities
�8����
Non‑repudiation mechanisms
������� 8.1���� Non-repudiation using a TTP security token (secure envelope)
������� 8.2���� Non-repudiation using security tokens and tamper-resistant
modules
������� 8.3���� Non-repudiation using a digital signature
������� 8.4���� Non-repudiation using Time Stamping
������� 8.5���� Non-repudiation using an in-line Trusted Third Party
������� 8.6���� Non-repudiation using a Notary
������� 8.7���� Threats to Non-repudiation
�9����
Interactions with other security services and mechanisms
������� 9.1���� Authentication
������� 9.2���� Access Control
������� 9.3���� Confidentiality
������� 9.4���� Integrity
��� ����9.5���� Audit
Annex A � Non-repudiation in OSI Basic Reference Model
Annex B � Non-repudiation Facilities Outline
Annex C � Non‑repudiation in store and forward systems
Annex D � Recovery in a Non-repudiation service
Annex E � Interaction with the Directory
Annex F � Bibliography