Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

I.S. CWA 14169:2004

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

SECURE SIGNATURE-CREATION DEVICES 'EAL 4+'

Available format(s)

Hardcopy , PDF

Superseded date

30-07-2013

Language(s)

English

Published date

01-01-2004

Preview
$474.30
Including GST where applicable

Foreword
Introduction
1 Scope
2 References
  2.1 Normative References
  2.2 Informative References
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Security requirements of secure signature-creation
  devices
  4.1 Signature-creation
  4.2 Protection profile for secure signature-creation
      devices
  4.3 Scope of SSCD Protection Profile application
  4.4 Requirements for signature algorithms and their
      parameters
  4.5 Evaluation assurance level of the SSCD Protection
      Profile
  4.6 Protection Profile Review
5 List of corrections to the Protection Profiles
  5.1 Common corrections
  5.2 Corrections for PP SSCD Type 1 - BSI-PP-0004-2002
  5.3 Corrections for PP SSCD Type 2 - BSI-PP-0005-2002
  5.4 Corrections for PP SSCD Type 3 - BSI-PP-0006-2002
Annex A (normative): Protection Profile for the SSCD Type 1
Annex B (normative): Protection Profile for the SSCD Type 2
Annex B (normative): Protection Profile for the SSCD Type 3

Specifies the security requirements for a SSCD which is the TOE.

DocumentType
Standard
Pages
221
PublisherName
National Standards Authority of Ireland
Status
Superseded
SupersededBy
Supersedes

ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more