ISO ISO/IEC TR 29149 Information technology - Security techniques - Best practices for the provision and use of time-stamping services - First Edition
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35.240
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- ISO 7498-2 Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture - First Edition
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- ISO 7498-2 Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture - First Edition
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI BS ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General
- BSI BS ISO/IEC 10118-4 + A1 Information Technology - Security Techniques - Hash-Functions - Part 4: Hash-Functions Using Modular Arithmetic - CORR: August 31, 2014; AMD: December 31, 2014
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- Картотека зарубежных и международных стандартов
International Organization for Standardization
Information technology - Security techniques - Best practices for the provision and use of time-stamping services - First Edition
N ISO/IEC TR 29149
Annotation
This Technical Report explains how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms. It defines:
— how time-stamp requesters should use time-stamp token generation services;
— how TSAs (time-stamping authorities) should provide a service of guaranteed quality;
— how TSAs should deserve trust based on good practices;
— which algorithms and parameters should be used in TST (time-stamp token) generation and TST renewal, so that TSTs resist during the time period during which the TSTs can be verified as being valid;
— how time-stamp verifiers should use the time-stamp token verification services, both when validating individual TSTs, and when validating sequences of renewal TSTs.
Автоматический перевод:
Информационные технологии - методы Безопасности - Методы наиболее успешной практики для условия и использования устанавливающих метку времени услуг - Первый Выпуск



