CSA CAN/CSA-ISO/IEC 11770-1:12 Information technology - Security techniques - Key management - Part 1: Framework
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- 35.240
- CENELEC CLC/TR 62685 Industrial communication networks - Profiles - Assessment guideline for safety devices using IEC 61784-3 functional safety communication profiles (FSCPs)
- ISO 7498-2 Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture - First Edition
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- ISO 7498-2 Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture - First Edition
- BSI BS ISO/IEC 9797-2 Information technology - Security techniques - Message authentication codes (MACs) Part 2: Mechanisms using a dedicated hashfunction
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI DD CEN/TS 14821-5 Traffic and Travel Information (TTI) TTI messages via cellular networks Part 5: Internal services
- BSI BS ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General
- BSI BS ISO/IEC 10118-4 + A1 Information Technology - Security Techniques - Hash-Functions - Part 4: Hash-Functions Using Modular Arithmetic - CORR: August 31, 2014; AMD: December 31, 2014
- ISO ISO/IEC 10118-1 Information Technology - Security Techniques - Hash-Functions - Part 1: General - Second Edition
- Картотека зарубежных и международных стандартов
CSA Standards
Information technology - Security techniques - Key management - Part 1: Framework
N CAN/CSA-ISO/IEC 11770-1:12
Annotation
This part of ISO/IEC 11770
a) establishes the general model on which key management mechanisms are based,
b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770,
c) specifies the characteristics of key management services,
d) establishes general principles on the management of keying material during its life cycle, and
e) establishes the conceptual model of key distribution.
Автоматический перевод:
Информационные технологии - методы безопасности - управление ключами - Часть 1: Платформа
Эта часть ISO/IEC 11770
a) устанавливает общую модель, на которой механизмы управления ключами базируются,
b) определяет фундаментальные понятия управления ключами, которые характерны для всех частей ISO/IEC 11770,
c) указывает характеристики услуг по управлению ключами,
d) устанавливает общие принципы на управлении манипулированием материала во время его жизненного цикла, и



