UNI CEN/TS 16702-1 : 2014
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
11-05-2022
01-01-2014
Foreword
0 Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations
5 Processes
6 Transactions
7 Security
Annex A (normative) - Data type specification
Annex B (normative) - Protocol Implementation
Conformance Statement
Annex C (informative) - Example transactions
Annex D (informative) - Addressed threats (in CEN/TS
16439)
Annex E (informative) - Essentials of the SM_CC concept
Annex F (informative) - Use of this Technical Specification
for the EETS
Bibliography
Defines transactions and data for Compliance Checking - Secure Monitoring.
DocumentType |
Standard
|
PublisherName |
Ente Nazionale Italiano di Unificazione (UNI)
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
CEN/TS 16702-1:2014 | Identical |
ISO/IEC TR 10000-1:1998 | Information technology — Framework and taxonomy of International Standardized Profiles — Part 1: General principles and documentation framework |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO 12855:2015 | Electronic fee collection Information exchange between service provision and toll charging |
ISO/IEC 9646-7:1995 | Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements |
ISO/IEC 8825-2:2015 | Information technology ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) Part 2: |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO 14813-6:2009 | Intelligent transport systems Reference model architecture(s) for the ITS sector Part 6: Data presentation in ASN.1 |
CEN/TS 16439:2013 | Electronic fee collection - Security framework |
ISO 17573:2010 | Electronic fee collection Systems architecture for vehicle-related tolling |
ISO/IEC 8825-4:2015 | Information technology ASN.1 encoding rules: XML Encoding Rules (XER) Part 4: |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
EN ISO 12855:2015 | Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015) |
ISO/TS 17575-1:2010 | Electronic fee collection Application interface definition for autonomous systems Part 1: Charging |
ISO 14906:2011 | Electronic fee collection Application interface definition for dedicated short-range communication |
ISO/TS 17444-1:2017 | Electronic fee collection — Charging performance — Part 1: Metrics |
ISO/IEC 19505-2:2012 | Information technology — Object Management Group Unified Modeling Language (OMG UML) — Part 2: Superstructure |
CEN ISO/TS 17444-1:2017 | Electronic fee collection - Charging performance - Part 1: Metrics (ISO/TS 17444-1:2017) |
ISO/IEC 19505-1:2012 | Information technology — Object Management Group Unified Modeling Language (OMG UML) — Part 1: Infrastructure |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/TS 12813:2009 | Electronic fee collection Compliance check communication for autonomous systems |
ISO/IEC 8824-1:2015 | Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1: |
ISO/TS 17575-3:2011 | Electronic fee collection Application interface definition for autonomous systems Part 3: Context data |
CEN ISO/TS 12813:2009 | Electronic fee collection - Compliance check communication for autonomous systems (ISO/TS 12813:2009) |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.