Encipherment
Digital signature
Access control
Data integrity
Authentication exchange
Traffic padding
Routing control
Notarization
The security services may be provided by means of security mechanism:[1][3][4]
The table1/X.800 shows the relationships between services and mechanisms
Some of them can be applied to connection oriented protocols, other to connectionless protocols or both.
The table 2/X.800 illustrates the relationship of security services and layers:[4]