CSA CAN/CSA-ISO/IEC 9798-1:12 Information technology - Security techniques - Entity authentication - Part 1: General
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 14888-3 AMD 1 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms AMENDMENT 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm - Second Edition
- 35
- ISO ISO/IEC 14888-3 AMD 1 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms AMENDMENT 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm - Second Edition
- 35.040
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- 13
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- CEN ISO/TR 9241-100 Ergonomics of human-system interaction - Part 100: Introduction to standards related to software ergonomics
- ISO ISO/IEC 15504-2 CORR 1 Software engineering - Process assessment - Part 2: Performing an assessment TECHNICAL CORRIGENDUM 1 - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 14888-3 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Third Edition
- Картотека зарубежных и международных стандартов
CSA Standards
Information technology - Security techniques - Entity authentication - Part 1: General
N CAN/CSA-ISO/IEC 9798-1:12
Annotation
This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity is the one that is claimed. An entity to be authenticated proves its identity by showing its knowledge of a secret. The mechanisms are defined as exchanges of information between entities and, where required, exchanges with a trusted third party.
The details of the mechanisms and the contents of the authentication exchanges are given in subsequent parts of ISO/IEC 9798.
Автоматический перевод:
Информационные технологии - методы Безопасности - идентификация Предприятия - Часть 1: Общий
Эта часть ISO/IEC 9798 указывает модель аутентификации и общие требования и ограничения для механизмов аутентификации объекта, которые используют методы безопасности. Эти механизмы используются для подтверждения этого, объект является тем, который требуется. Объект, который будет аутентифицироваться, удостоверяет свою личность путем показа его знания секрета. Механизмы определяются как обмены информацией между объектами и, при необходимости, обмены с доверенной третьей стороной.



