UNI CEN/TS 16439 : 2013
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
11-05-2022
01-01-2013
Foreword
0 Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 Trust model
6 Security requirements
7 Security measures - countermeasures
8 Security specifications for interoperable interface
implementation
9 Key management
Annex A (normative) - Data type specification
Annex B (normative) - Implementation Conformance
Statement (ICS) proforma
Annex C (informative) - Stakeholder objectives and generic
requirements
Annex D (informative) - Threat analysis
Annex E (informative) - Security Policies
Annex F (informative) - Example for an EETS Security
Policy
Annex G (informative) - Requirements on privacy-focused
implementation
Bibliography
Specifies the roles and functions as well as the internal and external entities of the EFC system environment.
DocumentType |
Standard
|
PublisherName |
Ente Nazionale Italiano di Unificazione (UNI)
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
CEN/TS 16439:2013 | Identical |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO 12855:2015 | Electronic fee collection Information exchange between service provision and toll charging |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC 8825-2:2015 | Information technology ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) Part 2: |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 27003:2017 | Information technology — Security techniques — Information security management systems — Guidance |
EN 15509:2014 | Electronic fee collection - Interoperability application profile for DSRC |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO 17573:2010 | Electronic fee collection Systems architecture for vehicle-related tolling |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 8825-4:2015 | Information technology ASN.1 encoding rules: XML Encoding Rules (XER) Part 4: |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/TS 17574:2017 | Electronic fee collection — Guidelines for security protection profiles |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
EN ISO 12855:2015 | Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015) |
ISO/TS 14907-2:2016 | Electronic fee collection Test procedures for user and fixed equipment Part 2: Conformance test for the on-board unit application interface |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
ISO/TS 17575-1:2010 | Electronic fee collection Application interface definition for autonomous systems Part 1: Charging |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO 14906:2011 | Electronic fee collection Application interface definition for dedicated short-range communication |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
CEN ISO/TS 14907-2:2016 | Electronic fee collection - Test procedures for user and fixed equipment - Part 2: Conformance test for the on-board unit application interface (ISO/TS 14907-2:2016) |
ISO/TS 13141:2010 | Electronic fee collection Localisation augmentation communication for autonomous systems |
CEN ISO/TS 17574:2017 | Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017) |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/TS 12813:2009 | Electronic fee collection Compliance check communication for autonomous systems |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO/IEC 14888-2:2008 | Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
CEN ISO/TS 12813:2009 | Electronic fee collection - Compliance check communication for autonomous systems (ISO/TS 12813:2009) |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.