Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

DD CEN ISO/TS 17574:2009

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

Electronic fee collection. Guidelines for security protection profiles

Available format(s)

Hardcopy , PDF

Withdrawn date

04-02-2019

Superseded by

PD CEN ISO/TS 17574:2017

Language(s)

English

Published date

31-01-2010

$618.22
Including GST where applicable

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
5 Outlines of Protection Profile
Annex A (informative) - Procedures for preparing documents
Annex B (informative) - Example of threat analysis evaluation
        method
Annex C (informative) - Abstract from Definition of threats
        and security controls for the Charging Interface
        in Electronic Fee Collection
Annex D (informative) - Common Criteria Recognition Arrangement
        (CCRA)
Bibliography

Defines a guideline for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in the ISO/IEC 15408 series and in ISO/IEC TR 15446.

Committee
EPL/278
DocumentType
Standard
Pages
70
PublisherName
British Standards Institution
RevisionOf
Status
Withdrawn
SupersededBy
UnderRevision

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 10118-4:1998 Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO 8731-1:1987 Banking Approved algorithms for message authentication Part 1: DEA
ISO/IEC 9798-4:1999 Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function
ISO/TS 17575-1:2010 Electronic fee collection Application interface definition for autonomous systems Part 1: Charging
ISO/TS 17575-4:2011 Electronic fee collection Application interface definition for autonomous systems Part 4: Roaming
ISO 14906:2011 Electronic fee collection Application interface definition for dedicated short-range communication
ISO/TS 17573:2003 Road Transport and Traffic Telematics Electronic Fee Collection (EFC) Systems architecture for vehicle related transport services
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
ISO/IEC TR 15446:2017 Information technology Security techniques Guidance for the production of protection profiles and security targets
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
ISO/TS 17575-3:2011 Electronic fee collection Application interface definition for autonomous systems Part 3: Context data
ISO/TS 17575-2:2010 Electronic fee collection Application interface definition for autonomous systems Part 2: Communication and connection to the lower layers

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more