Customer Support: 131 242

  • Shopping Cart
    There are no items in your cart
Please Select Your Option.
It seems you are away from your “home” country. Do you wish to be re-directed to your “home” store? If you choose “YES”, you will see product, taxation, and shipping information relevant to your country. If you select “NO”, the current store's conditions will apply.
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

BS ISO/IEC 13888-1:2009

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Information technology. Security techniques. Non-repudiation General

Available format(s)

Hardcopy , PDF

Superseded date

23-09-2020

Superseded by

BS ISO/IEC 13888-1:2020

Language(s)

English

Published date

31-08-2009

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Organisation of the remainder of this part of
   of ISO/IEC 13888
6 Requirements
7 Generic non-repudiation services
   7.1 Entities involved in the provision and verification
        of evidence
   7.2 Non-repudiation services
8 Trusted third party involvement
   8.1 General
   8.2 Evidence generation phase
   8.3 Evidence transfer, storage and retrieval phase
   8.4 Evidence verification phase
9 Evidence generation and verification mechanisms
   9.1 General
   9.2 Secure envelopes
   9.3 Digital signatures
   9.4 Evidence verification mechanism
10 Non-repudiation tokens
   10.1 General
   10.2 Generic non-repudiation token
   10.3 Time-stamping token
   10.4 Notarization token
11 Specific non-repudiation services
   11.1 General
   11.2 Non-repudiation of origin
   11.3 Non-repudiation of delivery
   11.4 Non-repudiation of submission
   11.5 Non-repudiation of transport
12 Use of specific non-repudiation tokens in a
   messaging environment
Bibliography

Provides a general model for subsequent parts specifying non-repudiation mechanisms using cryptographic techniques.

Committee
IST/33/2
DevelopmentNote
Supersedes 97/640425 DC. (03/2007) Supersedes 08/30169505 DC. (08/2009)
DocumentType
Standard
Pages
30
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 13888-1:2009 Identical

ISO/IEC 13888-2:2010 Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques
ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

$443.41
Including GST where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.