BS ISO IEC TR 14516-2002 Information technology - Security techniques - Guidelines for the use and management of trusted third party services《信息技术 安全技术 委托第三方服务的使用和管理指南》.pdf
《BS ISO IEC TR 14516-2002 Information technology - Security techniques - Guidelines for the use and management of trusted third party services《信息技术 安全技术 委托第三方服务的使用和管理指南》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC TR 14516-2002 Information technology - Security techniques - Guidelines for the use and management of trusted third party services《信息技术 安全技术 委托第三方服务的使用和管理指南》.pdf(42页珍藏版)》请在麦多课文档分享上搜索。
1、BRITISH STANDARD BS ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services ICS 35.040 BS ISO/IEC TR 14516:2002 This British Standard, having been prepared under the direction of the DISC Board, was published under the au
2、thority of the Standards Policy and Strategy Committee on 5 August 2002 BSI 5 August 2002 ISBN 0 580 40180 4 National foreword This British Standard reproduces verbatim ISO/IEC TR 14516:2002 and implements it as the UK national standard. The UK participation in its preparation was entrusted to Techn
3、ical Committee IST/33, Security techniques, which has the responsibility to: A list of organizations represented on this committee can be obtained on request to its secretary. Cross-references The British Standards which implement international publications referred to in this document may be found
4、in the BSI Catalogue under the section entitled “International Standards Correspondence Index”, or by using the “Search” facility of the BSI Electronic Catalogue or of British Standards Online. This publication does not purport to include all the necessary provisions of a contract. Users are respons
5、ible for its correct application. Compliance with a British Standard does not of itself confer immunity from legal obligations. aid enquirers to understand the text; present to the responsible international/European committee any enquiries on the interpretation, or proposals for change, and keep the
6、 UK interests informed; monitor related international and European developments and promulgate them in the UK. Summary of pages This document comprises a front cover, an inside front cover, the ISO title page, pages ii to vi, pages 1 to 33, and a back cover. The BSI copyright date displayed in this
7、document indicates when the document was last issued. Amendments issued since publication Amd. No. Date Comments Reference number ISO/IEC TR 14516:2002(E)TECHNICAL REPORT ISO/IEC TR 14516 First edition 2002-06-15 Information technology Security techniques Guidelines for the use and management of Tru
8、sted Third Party services Technologies de linformation Techniques de scurit Lignes directrices pour lemploi et la gestion des services TTP BSISO/IECTR14516:2002 IS/OIET CR :615412002(E) lcsid FDParemi ihTs PDF file mac ytnoaie nmt deddebyfepca.se In ccaocnadrw eith Aebods licsneilop gnic,y this file
9、 mairp eb yntiv ro deewb detu slahl ton ide ebtlnu desse tt ehyfepacse whice era hml era deddebicsnede to i dnanstlaled t noeh comtupfrep reomrign tide ehti.gn In wodnlidaogn this file, trapies ccatpe tiereht nsnopser ehibility fo ton infriignA gnebods licnesilop gnic.y I ehTStneC Oarl Secrteiraat c
10、acepts l oniibality in this .aera Ai ebods a tredamafo kr Aebod SystemI sncotaropr.de teDails fo ts ehoftwaorp ercudts ust deo crtaet ehis PDF file ceb na fi dnuon tlareneG eh Info leratit evo tf ehile; tP ehD-Fcrtaeiarap nomtesre were tpoimizf deoirp rnti.gn Evyre casah er t neebakt neo snet eruhat
11、 tf ehile is suitlbaf eosu rI yb eSO memidob rebse. In the lnuikletneve y ttah a lborpem leratign to it is fnuo,d lpsaee inform ttneC ehlar Secrteiraat at tsserdda eh igleb nevwo. ISO/IE2002 C Athgir lls serevr.de selnUs towrehise specfi,dei trap on fo this ilbupctanoi may cudorper ebtu ro deziliyna
12、 ni de fomr yb ro nam y,snae lecetrinoc m roecinahcal, inclidutohp gnocpoiym dna gnicrfoilm, wittuoh repmissii non writif gnrom ietreh ISa Ot tserdda ehs lebwo I roSOs membre ydob in teh ctnuoo yrf ttseuqer ehe.r ISO cirypothg fofice saCe tsopale 65 eneG 1121-HC02 av leT. 14 + 10 947 22 11 xaF 90 94
13、7 22 14 + 74 E-mail cirypothgiso.ch Web ww.wiso.ch rPnietd ni wSztierland ii I SO/IE 2002 C All irhgts seredevrBSISO/IECTR14516:2002iiIS/OIET CR :615412002(E) I SO/IE 2002 C All irhgts seredevr iiiCONTENTS Page 1 Scope . 1 2 References 1 2.1 Identical Recommendations | International Standards 1 2.2
14、Paired Recommendations | International Standards equivalent in technical content 1 2.3 Additional References 1 3 Definitions 2 4 General Aspects 3 4.1 Basis of Security Assurance and Trust 3 4.2 Interaction between a TTP and Entities Using its Services 4 4.2.1 In-line TTP Services . 4 4.2.2 On-line
15、TTP Services 4 4.2.3 Off-line TTP Services. 5 4.3 Interworking of TTP Services 5 5 Management and Operational Aspects of a TTP 5 5.1 Legal Issues. 6 5.2 Contractual Obligations 6 5.3 Responsibilities 7 5.4 Security Policy. 7 5.4.1 Security Policy Elements 8 5.4.2 Standards 8 5.4.3 Directives and Pro
16、cedures. 8 5.4.4 Risk Management. 8 5.4.5 Selection of Safeguards. 9 5.4.5.1 Physical and Environmental Measures . 9 5.4.5.2 Organisational and Personnel Measures . 9 5.4.5.3 IT Specific Measures. 9 5.4.6 Implementation Aspects of IT Security 10 5.4.6.1 Awareness and Training 10 5.4.6.2 Trustworthin
17、ess and Assurance 10 5.4.6.3 Accreditation of TTP Certification Bodies 11 5.4.7 Operational Aspects of IT Security 11 5.4.7.1 Audit/Assessment 11 5.4.7.2 Incident Handling 12 5.4.7.3 Contingency Planning 12 5.5 Quality of Service 12 5.6 Ethics 12 5.7 Fees. 12 6 Interworking. 12 6.1 TTP-Users . 13 6.
18、2 User-User 13 6.3 TTP-TTP. 13 6.4 TTP-Law Enforcement Agency 14 7 Major Categories of TTP Services. 14 7.1 Time Stamping Service 14 7.1.1 Time Stamping Authority 14 7.2 Non-repudiation Services. 15 7.3 Key Management Services. 16 7.3.1 Key Generation Service 16 7.3.2 Key Registration Service. 16 7.
19、3.3 Key Certification Service 16 7.3.4 Key Distribution Service. 17 7.3.5 Key Installation Service 17 7.3.6 Key Storage Service 17 7.3.7 Key Derivation Service. 17 7.3.8 Key Archiving Service 17 BSISO/IECTR14516:2002iiiIS/OIET CR :615412002(E) vi I SO/IE 2002 C All irhgts seredevrPage 7.3.9 Key Revo
20、cation Service 17 7.3.10 Key Destruction Service . 17 7.4 Certificate Management Services . 18 7.4.1 Public Key Certificate Service 18 7.4.2 Privilege Attribute Service 18 7.4.3 On-line Authentication Service Based on Certificates 19 7.4.4 Revocation of Certificates Service. 19 7.5 Electronic Notary
21、 Public Services 19 7.5.1 Evidence Generation Service 20 7.5.2 Evidence Storage Service 20 7.5.3 Arbitration Service 20 7.5.4 Notary Authority 20 7.6 Electronic Digital Archiving Service 21 7.7 Other Services . 22 7.7.1 Directory Service 22 7.7.2 Identification and Authentication Service 23 7.7.2.1
22、On-line Authentication Service 23 7.7.2.2 Off-line Authentication Service . 25 7.7.2.3 In-line Authentication Service 25 7.7.3 In-line Translation Service 25 7.7.4 Recovery Services 25 7.7.4.1 Key Recovery Services 25 7.7.4.2 Data Recovery Services . 26 7.7.5 Personalisation Service . 26 7.7.6 Acces
23、s Control Service. 26 7.7.7 Incident Reporting and Alert Management Service 26 Annex A Security Requirements for Management of TTPs 28 Annex B Aspects of CA management . 29 B.1 Example of Registration Process Procedures. 29 B.2 An example of requirements for Certification Authorities. 29 B.3 Certifi
24、cation Policy and Certification Practice Statement (CPS) 31 Annex C Bibliography 32 Table of Figures Figure 1 In-line TTP Service Between Entities 4 Figure 2 On-line TTP Service Between Entities 5 Figure 3 Off-line TTP Service Between Entities 5 Figure 4 Interworking of TTPs in Different Domains 13
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIECTR145162002INFORMATIONTECHNOLOGYSECURITYTECHNIQUESGUIDELINESFORTHEUSEANDMANAGEMENTOFTRUSTEDTHIRDPARTYSERVICES

链接地址:http://www.mydoc123.com/p-396987.html