• There are no items in your cart

BS ISO/IEC 13888-1:2009

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

Information technology. Security techniques. Non-repudiation General
Available format(s)

Hardcopy , PDF

Superseded date

09-23-2020

Language(s)

English

Published date

08-31-2009

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Organisation of the remainder of this part of
   of ISO/IEC 13888
6 Requirements
7 Generic non-repudiation services
   7.1 Entities involved in the provision and verification
        of evidence
   7.2 Non-repudiation services
8 Trusted third party involvement
   8.1 General
   8.2 Evidence generation phase
   8.3 Evidence transfer, storage and retrieval phase
   8.4 Evidence verification phase
9 Evidence generation and verification mechanisms
   9.1 General
   9.2 Secure envelopes
   9.3 Digital signatures
   9.4 Evidence verification mechanism
10 Non-repudiation tokens
   10.1 General
   10.2 Generic non-repudiation token
   10.3 Time-stamping token
   10.4 Notarization token
11 Specific non-repudiation services
   11.1 General
   11.2 Non-repudiation of origin
   11.3 Non-repudiation of delivery
   11.4 Non-repudiation of submission
   11.5 Non-repudiation of transport
12 Use of specific non-repudiation tokens in a
   messaging environment
Bibliography

Provides a general model for subsequent parts specifying non-repudiation mechanisms using cryptographic techniques.

Committee
IST/33/2
DevelopmentNote
Supersedes 97/640425 DC. (03/2007) Supersedes 08/30169505 DC. (08/2009)
DocumentType
Standard
Pages
30
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 13888-1:2009 Identical

ISO/IEC 13888-2:2010 Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques
ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

View more information
US$237.18
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.