Customer Support: 131 242

  • Shopping Cart
    There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

TR 102 272 : 1.1.1

Current

Current

The latest, up-to-date edition.

ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES

Available format(s)

Hardcopy , PDF

Language(s)

English

$43.16
Including GST where applicable

Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Signature Policy overview
5 Signature policy specification in informal free text form
6 Signature policy specification in ASN.1
  6.1 Overall ASN.1 structure
  6.2 Signature validation policy
  6.3 Common Rules
  6.4 Commitment Rules
  6.5 Signer and Verifier Rules
  6.6 Certificate and revocation requirement
  6.7 Signing certificate trust conditions
  6.8 Time-Stamp trust conditions
  6.9 Attribute trust conditions
  6.10 Algorithm constraints
  6.11 Signature policy extensions
Annex A: ASN.1 modules
      A.1 Signature policies definitions using X.208 (1988)
          ASN.1 syntax
      A.2 Signature policy definitions using X.680 (2002)
          ASN.1 syntax
Annex B: What is a signature policy and signature validation policy
      B.0 Introduction
      B.1 Identification of signature policy
      B.2 General signature policy information
      B.3 Recognized commitment types
      B.4 Rules for use of certification authorities
      B.5 Rules for the use of time-stamping and time-marking
      B.6 Revocation rules
      B.7 Rules for the use of roles
      B.8 Rules for verification data to be followed
      B.9 Rules for algorithm constraints and key lengths
      B.10 Other signature policy rules
      B.11 Signature policy protection
Annex C: Bibliography
History

Describes the aspects of Electronic Signature Policies that were defined in TS 101 733 v1 and other older versions of that document.

Committee
ESI
DocumentType
Standard
Pages
39
PublisherName
European Telecommunications Standards Institute
Status
Current

TS 102 853 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE VALIDATION PROCEDURES AND POLICIES
13/30274710 DC : 0 BS EN 419111-4 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE VERIFICATION APPLICATION - PART 4: CORE PP
SR 003 186 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) TESTING INTEROPERABILITY AND CONFORMITY ACTIVITIES TO BE RUN DURING THE IMPLEMENTATION AND PROMOTION OF THE FRAMEWORK OF DIGITAL SIGNATURES
13/30274704 DC : 0 BS EN 419111-2 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 2: CORE PP
13/30274701 DC : 0 BS EN 419111-1 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - PART 1: INTRODUCTION
TS 102 778-5 : 1.1.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); PDF ADVANCED ELECTRONIC SIGNATURE PROFILES; PART 5: PADES FOR XML CONTENT - PROFILES FOR XADES SIGNATURES
13/30274713 DC : 0 BS EN 419111-5 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE VERIFICATION APPLICATION - PART 5: POSSIBLE EXTENSIONS
13/30274707 DC : 0 BS EN 419111-3 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 3: POSSIBLE EXTENSIONS

TS 101 861 : 1.4.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TIME STAMPING PROFILE
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 10118-4:1998 Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic
TR 102 038 : 1.1.1 TC SECURITY - ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); XML FORMAT FOR SIGNATURE POLICIES
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
IEEE DRAFT 1363 : D13 99 DRAFT STANDARD SPECIFICATIONS FOR PUBLIC KEY CRYPTOGRAPHY
ISO/IEC 14888-1:2008 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
TS 102 023 : 1.2.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TIME-STAMPING AUTHORITIES
ISO/IEC 13888-1:2009 Information technology Security techniques Non-repudiation Part 1: General
TS 101 733 : 2.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CMS ADVANCED ELECTRONIC SIGNATURES (CADES)
TS 101 456 : 1.4.3 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING QUALIFIED CERTIFICATES
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
ISO/IEC 15946-2:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
TS 101 903 : 1.4.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); XML ADVANCED ELECTRONIC SIGNATURES (XADES)
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
ISO/IEC 9796:1991 Information technology Security techniques Digital signature scheme giving message recovery
ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
TR 102 045 : 1.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE POLICY FOR EXTENDED BUSINESS MODEL
TS 101 862 : 1.3.3 QUALIFIED CERTIFICATE PROFILE

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.