CAN CSA-ISO IEC 11770-4-2007 Information technology - Security techniques - Key management - Part 4 Mechanisms based on weak secrets (Incorporates Corrigendum 1 December 2010).pdf
《CAN CSA-ISO IEC 11770-4-2007 Information technology - Security techniques - Key management - Part 4 Mechanisms based on weak secrets (Incorporates Corrigendum 1 December 2010).pdf》由会员分享,可在线阅读,更多相关《CAN CSA-ISO IEC 11770-4-2007 Information technology - Security techniques - Key management - Part 4 Mechanisms based on weak secrets (Incorporates Corrigendum 1 December 2010).pdf(56页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference numberISO/IEC 11770-4:2006(E)ISO/IEC 2006INTERNATIONAL STANDARD ISO/IEC11770-4First edition2006-05-01Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets Technologies de linformation Techniques de scurit Gestion de cls Partie 4: Mcanismes bass
2、 sur des secrets faibles International Organization for Standardization (ISO), 2006. All rights reserved. International Electrotechnical Commission (IEC), 2006. All rights reserved. NOT FOR RESALE.National Standard of CanadaCAN/CSA-ISO/IEC 11770-4:07(ISO/IEC 11770-4:2006)International Standard ISO/I
3、EC 11770-4:2006 (first edition, 2006-05-01) has been adopted withoutmodification (IDT) as CSA Standard CAN/CSA-ISO/IEC 11770-4:07, which has been approved as a NationalStandard of Canada by the Standards Council of Canada.ISBN 978-1-55436-573-9 November 2007Legal Notice for StandardsCanadian Standar
4、ds Association (CSA) standards are developed through a consensus standards development process approved by the Standards Council of Canada. This process brings together volunteers representing varied viewpoints and interests to achieve consensus and develop a standard. Although CSA administers the p
5、rocess and establishes rules to promote fairness in achieving consensus, it does not independently test, evaluate, or verify the content of standards.Disclaimer and exclusion of liabilityThis document is provided without any representations, warranties, or conditions of any kind, express or implied,
6、 including, without limitation, implied warranties or conditions concerning this documents fitness for a particular purpose or use, its merchantability, or its non-infringement of any third partys intellectual property rights. CSA does not warrant the accuracy, completeness, or currency of any of th
7、e information published in this document. CSA makes no representations or warranties regarding this documents compliance with any applicable statute, rule, or regulation. IN NO EVENT SHALL CSA, ITS VOLUNTEERS, MEMBERS, SUBSIDIARIES, OR AFFILIATED COMPANIES, OR THEIR EMPLOYEES, DIRECTORS, OR OFFICERS
8、, BE LIABLE FOR ANY DIRECT, INDIRECT, OR INCIDENTAL DAMAGES, INJURY, LOSS, COSTS, OR EXPENSES, HOWSOEVER CAUSED, INCLUDING BUT NOT LIMITED TO SPECIAL OR CONSEQUENTIAL DAMAGES, LOST REVENUE, BUSINESS INTERRUPTION, LOST OR DAMAGED DATA, OR ANY OTHER COMMERCIAL OR ECONOMIC LOSS, WHETHER BASED IN CONTRA
9、CT, TORT (INCLUDING NEGLIGENCE), OR ANY OTHER THEORY OF LIABILITY, ARISING OUT OF OR RESULTING FROM ACCESS TO OR POSSESSION OR USE OF THIS DOCUMENT, EVEN IF CSA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, INJURY, LOSS, COSTS, OR EXPENSES.In publishing and making this document available, CSA
10、 is not undertaking to render professional or other services for or on behalf of any person or entity or to perform any duty owed by any person or entity to another person or entity. The information in this document is directed to those who have the appropriate degree of experience to use and apply
11、its contents, and CSA accepts no responsibility whatsoever arising in any way from any and all use of or reliance on the information contained in this document. CSA is a private not-for-profit company that publishes voluntary standards and related documents. CSA has no power, nor does it undertake,
12、to enforce compliance with the contents of the standards or other documents it publishes. Intellectual property rights and ownershipAs between CSA and the users of this document (whether it be in printed or electronic form), CSA is the owner, or the authorized licensee, of all works contained herein
13、 that are protected by copyright, all trade-marks (except as otherwise noted to the contrary), and all inventions and trade secrets that may be contained in this document, whether or not such inventions and trade secrets are protected by patents and applications for patents. Without limitation, the
14、unauthorized use, modification, copying, or disclosure of this document may violate laws that protect CSAs and/or others intellectual property and may give rise to a right in CSA and/or others to seek legal redress for such use, modification, copying, or disclosure. To the extent permitted by licenc
15、e or by law, CSA reserves all intellectual property rights in this document.Patent rightsAttention is drawn to the possibility that some of the elements of this standard may be the subject of patent rights. CSA shall not be held responsible for identifying any or all such patent rights. Users of thi
16、s standard are expressly advised that determination of the validity of any such patent rights is entirely their own responsibility.Authorized use of this documentThis document is being provided by CSA for informational and non-commercial use only. The user of this document is authorized to do only t
17、he following:If this document is in electronic form:.load this document onto a computer for the sole purpose of reviewing it;.search and browse this document; and.print this document. Limited copies of this document in print or paper form may be distributed only to persons who are authorized by CSA
18、to have such copies, and only if this Legal Notice appears on each such copy.In addition, users may not and may not permit others to.alter this document in any way or remove this Legal Notice from the attached standard;.sell this document without authorization from CSA; or.make an electronic copy of
19、 this document.If you do not agree with any of the terms and conditions contained in this Legal Notice, you may not load or use this document or make any copies of the contents hereof, and if you do make such copies, you are required to destroy them immediately. Use of this document constitutes your
20、 acceptance of the terms and conditions of this Legal Notice.Information technology Security techniques Key management Part 4: Mechanisms based on weak secretsTechnical Corrigendum 1:2010 (IDT) toNational Standard of CanadaCAN/CSA-ISO/IEC 11770-4-07(ISO/IEC 11770-4:2006, IDT)NOT FOR RESALE.PUBLICATI
21、ON NON DESTINE LA REVENTE.CSA Standards Update ServiceTechnical Corrigendum 1:2010 toCAN/CSA-ISO/IEC 11770-4-07December 2010Title: Information technology Security techniques Key management Part 4: Mechanisms based on weak secretsPagination:2 pagesTo register for e-mail notification about any updates
22、 to this publicationgo to www.ShopCSA.caclick on E-mail Services under MY ACCOUNTclick on CSA Standards Update ServiceThe List ID that you will need to register for updates to this publication is 2418648.If you require assistance, please e-mail techsupportcsa.ca or call 416-747-2233.Visit CSAs polic
23、y on privacy at www.csagroup.org/legal to find out how we protect your personal information.ICS 35.040 Ref. No. ISO/IEC 11770-4:2006/Cor.1:2009(E) ISO/IEC 2009 All rights reserved INTERNATIONAL STANDARD ISO/IEC 11770-4:2006 TECHNICAL CORRIGENDUM 1 Published 2009-09-15 INTERNATIONAL ORGANIZATION FOR
24、STANDARDIZATION ORGANISATION INTERNATIONALE DE NORMALISATIONINTERNATIONAL ELECTROTECHNICAL COMMISSION COMMISSION LECTROTECHNIQUE INTERNATIONALEInformation technology Security techniques Key management Part 4: Mechanisms based on weak secrets TECHNICAL CORRIGENDUM 1 Technologies de linformation Techn
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CANCSAISOIEC1177042007INFORMATIONTECHNOLOGYSECURITYTECHNIQUESKEYMANAGEMENTPART4MECHANISMSBASEDONWEAKSECRETSINCORPORATESCORRIGENDUM1DECEMBER2010PDF

链接地址:http://www.mydoc123.com/p-590288.html