CCITT Rec. X.402 (11/1988) – MESSAGE HANDLING SYSTEMS: OVERALL ARCHITECTURE
TABLE OF CONTENTS
0 Introduction
1 Scope
2 References
2.1 Open systems interconnection
2.2 Directory systems
2.3 Message handling systems
3 Definitions
3.1 Open systems interconnection
3.2 Directory systems
3.3 Message handling systems
4 Abbreviations
5 Conventions
5.1 ASN.1
5.2 Grade
5.3 Terms
6 Overview
7 Functional model
7.1 Primary functional objects
7.1.1 Message Handling System
7.1.2 Users
7.1.3 Distribution lists
7.2 Secondary functional objects
7.2.1 Message Transfer System
7.2.2 User agents
7.2.3 Message stores
7.2.4 Access units
7.3 Tertiary functional objects
7.3.1 Message transfer agents
7.4 Selected AU types
7.4.1 Physical delivery
7.4.2 Telematic
7.4.3 Telex
8 Information model
8.1 Messages
8.2 Probes
8.3 Reports
9 Operational model
9.1 Transmittal
9.2 Transmittal roles
9.3 Transmittal steps
9.3.1 Origination
9.3.2 Submission
9.3.3 Import
9.3.4 Transfer
9.3.5 Export
9.3.6 Delivery
9.3.7 Retrieval
9.3.8 Receipt
9.4 Transmittal events
9.4.1 Splitting
9.4.2 Joining
9.4.3 Name resolution
9.4.4 DL expansion
9.4.5 Redirection
9.4.6 Conversion
9.4.7 Non-delivery
9.4.8 Non-affirmation
9.4.9 Affirmation
9.4.10 Routing
10 Security model
10.1 Security policies
10.2 Security services
10.2.1 Origin Authentication security services
10.2.2 Secure Access Management security service
10.2.3 Data Confidentiality security services
10.2.4 Data Integrity security services
10.2.5 Non-repudiation security services
10.2.6 Message Security Labelling security service
10.2.7 Security management services
10.3 Security elements
10.3.1 Authentication security elements
10.3.2 Secure Access Management security elements
10.3.3 Data Confidentiality security elements
10.3.4 Data Integrity security elements
10.3.5 Non-repudiation security elements
10.3.6 Security Label security elements
10.3.7 Security Management security elements
10.3.8 Double Enveloping Technique
11 Overview
12 Functional configurations
12.1 Regarding the Directory
12.2 Regarding the message store
13 Physical configurations
13.1 Messaging systems
13.1.1 Access systems
13.1.2 Storage systems
13.1.3 Access and storage systems
13.1.4 Transfer systems
13.1.5 Access and transfer systems
13.1.6 Storage and transfer systems
13.1.7 Access, storage, and transfer systems
13.2 Representative configurations
13.2.1 Fully centralized
13.2.2 Centralized message transfer and storage
13.2.3 Centralized message transfer
13.2.4 Fully distributed
14 Organizational configurations
14.1 Management domains
14.1.1 Administration management domains
14.1.2 Private management domains
14.2 Representative configurations
14.2.1 Fully centralized
14.2.2 Directly connected
14.2.3 Indirectly connected
15 The Global MHS
16 Overview
17 Naming
17.1 Directory names
17.2 O/R names
18 Addressing
18.1 Attribute lists
18.2 Character sets
18.3 Standard attributes
18.3.1 Administration-domain-name
18.3.2 Common-name
18.3.3 Country-name
18.3.4 Extension-postal-O/R-address-components
18.3.5 Extension-physical-delivery-address-components
18.3.6 Local-postal-attributes
18.3.7 Network-address
18.3.8 Numeric-user-identifier
18.3.9 Organization-name
18.3.10 Organizational-unit-names
18.3.11 Physicel-delivery-service-name
18.3.12 Personal-name
18.3.13 Physical-delivery-country-name
18.3.14 Physical-delivery-office-name
18.3.15 Physical-delivery-office-number
18.3.16 Physical-delivery-organization-name
18.3.17 Physical-delivery-personal-name
18.3.18 Post-office-box-address
18.3.19 Postal-code
18.3.20 Poste-restante-address
18.3.21 Private-domain-name
18.3.22 Street-address
18.3.23 Terminal-identifier
18.3.24 Terminal-type
18.3.25 Unformatted-postal-address
18.3.26 Unique-postal-name
18.4 Attribute list equivalence
18.5 O/R address forms
18.5.1 Mnemonic O/R address
18.5.2 Numeric O/R address
18.5.3 Postal O/R address
18.5.4 Terminal O/R address
18.6 Conditional attributes
19 Routing
20 Overview
21 Authentication
22 Name resolution
23 DL expansion
24 Capability assessment
25 Overview
26 Application service elements
26.1 The ASE concept
26.2 Symmetric and asymmetric ASEs
26.3 Message handling ASEs
26.3.1 Message transfer
26.3.2 Message submission
26.3.3 Message delivery
26.3.4 Message retrieval
26.3.5 Message administration
26.4 Supporting ASEs
26.4.1 Remote operations
26.4.2 Reliable transfer
26.4.3 Association control
27 Application contexts
ANNEX A – Directory object classes and attributes
A.1 Object classes
A.2 Attributes
A.3 Attribute syntaxes
ANNEX B – Reference definition of object identifiers
ANNEX C – Reference definition of directory object classes and attributes
ANNEX D – Security threats
D.1 Masquerade
D.2 Message sequencing
D.3 Modification of information
D.4 Denial of service
D.5 Repudiation
D.6 Leakage of information
D.7 Other threats
ANNEX E – Provision of security services in Recommendation X.411
ANNEX F – Differences between CCITT Recommendation and ISO Standard
ANNEX G – Index
G.1 Abbreviations
G.2 Terms