• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ISO/IEC 13888-2:2010

Current
Current

The latest, up-to-date edition.

Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques
Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Published date

01-12-2010

The goal of the non-repudiation service is to generate, collect, maintain, make available and validate evidence concerning a claimed event or action in order to resolve disputes about the occurrence or non-occurrence of the event or action. ISO/IEC 13888-2:2010 provides descriptions of generic structures that can be used for non-repudiation services, and of some specific communication-related mechanisms which can be used to provide non-repudiation of origin (NRO) and non-repudiation of delivery (NRD). Other non-repudiation services can be built using the generic structures described in ISO/IEC 13888-2:2010 in order to meet the requirements defined by the security policy.

ISO/IEC 13888-2:2010 relies on the existence of a trusted third party (TTP) to prevent fraudulent repudiation or accusation. Usually, an online TTP is needed.

Non-repudiation can only be provided within the context of a clearly defined security policy for a particular application and its legal environment. Non-repudiation policies are defined in ISO/IEC 10181-4.

DocumentType
Standard
Pages
17
PublisherName
International Organization for Standardization
Status
Current
Supersedes

02/652659 DC : DRAFT NOV 2002 ISO/IEC FCD 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
CSA ISO/IEC TR 14516 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
CAN/CSA-ISO/IEC TR 14516-04 (R2017) Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15)
CSA ISO/IEC 13888-1 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
CSA ISO/IEC 15945 : 2004 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
CSA ISO/IEC TR 14516 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES
INCITS/ISO/IEC 15945 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
08/30169505 DC : DRAFT JULY 2008 BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
BS ISO/IEC 15945:2002 Information technology. Security techniques. Specification of TTP services to support the application of digital signatures
CAN/CSA-ISO/IEC 15945-04 (R2017) Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01)
BS ISO 15668:1999 Banking. Secure file transfer (retail)
ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
BS ISO/IEC 13888-1:2009 Information technology. Security techniques. Non-repudiation General
BS ISO/IEC TR 14516:2002 Information technology. Security techniques. Guidelines for the use and management of trusted third party services
ISO 15668:1999 Banking Secure file transfer (retail)
CSA ISO/IEC 13888-1:2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL
TR 102 605 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED E-MAIL
INCITS/ISO/IEC 18028-1 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT
CSA ISO/IEC 15945 : 2004 : R2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
INCITS/ISO/IEC 15945 : 2002 : R2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
ISO/IEC TR 13335-5:2001 Information technology Guidelines for the management of IT Security Part 5: Management guidance on network security
ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures

ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

View more information
£88.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.