• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ETR 237 : 20001

Current

Current

The latest, up-to-date edition.

SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS

Available format(s)

Hardcopy , PDF

Language(s)

English

Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Security features
  4.1 Introduction
  4.2 Overview of security features
5 Security mechanisms
  5.1 Introduction
  5.2 Overview of security mechanisms
  5.3 Format of description
Annex A: Description of security mechanisms
      A.1 Authentication/identification
      A.2 Confidentiality/encryption
      A.3 Integrity
      A.4 Access control
      A.5 Key management
Annex B: The relationship of security features and mechanisms
History

Acquaints with guidelines for the selection and application of specific security mechanisms in an annex.

Committee
NA
DocumentType
Standard
Pages
32
PublisherName
European Telecommunications Standards Institute
Status
Current

TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
TR 101 771 : 1.1.1 TIPHON RELEASE 4; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; THREAT ANALYSIS
ETR 236 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
ETR 332 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)

ISO/IEC 10181-7:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Security audit and alarms framework
ETR 232 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY
ISO/IEC 9798-3:1998 Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques
ISO 8372:1987 Information processing Modes of operation for a 64-bit block cipher algorithm
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 10118-4:1998 Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic
ISO/IEC 9979:1999 Information technology Security techniques Procedures for the registration of cryptographic algorithms
ETS 300 175-7 : 20003 RADIO EQUIPMENT AND SYSTEMS (RES); DIGITAL EUROPEAN CORDLESS TELECOMMUNICATIONS (DECT); COMMON INTERFACE (CI); SECURITY FEATURES
ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ETS 300 534 : 20003 EUROPEAN DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2) - SECURITY RELATED NETWORK FUNCTIONS
ETR 340 : 20001 TELECOMMUNICATIONS SECURITY
ISO/IEC 9798-5:2009 Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ETR 086-3 : 20001 TRANS EUROPEAN TRUNKED RADIO (TETRA) SYSTEMS - TECHNICAL REQUIREMENTS SPECIFICATION - SECURITY ASPECTS
ETS 300 506 : 20003 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2); SECURITY ASPECTS (GSM 02.09 VERSION 4.5.1)
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO 9160:1988 Information processing Data encipherment Physical layer interoperability requirements
ISO 11568-4:2007 Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
ISO 11568-3:1994 Banking Key management (retail) Part 3: Key life cycle for symmetric ciphers
ETS 300 614 : 20001 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2) - SECURITY MANAGEMENT
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 9796:1991 Information technology Security techniques Digital signature scheme giving message recovery
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
ISO/IEC 9797:1994 Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm

View more information
£15.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.