• There are no items in your cart

CEI EN 50159 : 2012

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS

Available format(s)

Hardcopy , PDF

Withdrawn date

06-18-2020

Superseded by

CEI EN 50159:2012-02

Language(s)

English

Published date

01-01-2012

US$149.24
Excluding Tax where applicable

Introduction
1 Scope
2 Normative references
3 Terms, definitions and abbreviations
4 Reference architecture
5 Threats to the transmission system
6 Classification of transmission systems
7 Requirements for defences
Annex A (informative) - Threats on open transmission systems
Annex B (informative) - Categories of transmission systems
Annex C (informative) - Guideline for defences
Annex D (informative) - Guidelines for use of the standard
Annex E (informative) - Mapping from previous standards
Annex ZZ (informative) - Coverage of Essential Requirements
         of EC Directives

Pertains to safety-related electronic systems using for digital communication purposes a transmission system which was not necessarily designed for safety-related applications and which is: - under the control of the designer and fixed during the lifetime, or - partly unknown or not fixed, however unauthorised access can be excluded, or - not under the control of the designer, and also unauthorised access has to be considered.

Committee
CT 9
DevelopmentNote
Classificazione CEI 9-127. Supersedes CEI EN 50159-1 & CEI EN 50159-2. (02/2012)
DocumentType
Standard
Pages
68
PublisherName
Comitato Elettrotecnico Italiano
Status
Withdrawn
SupersededBy
Supersedes

Standards Relationship
EN 50159:2010 Identical

IEC 61025:2006 Fault tree analysis (FTA)
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 10118-4:1998 Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
2008/57/EC : 2008 AMD 5 2014 DIRECTIVE 2008/1957/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 17 JUNE 2008 ON THE INTEROPERABILITY OF THE RAIL SYSTEM WITHIN THE COMMUNITY (RECAST) (TEXT WITH EEA RELEVANCE)
ISO/IEC 9979:1999 Information technology Security techniques Procedures for the registration of cryptographic algorithms
FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
UIC 738 : 2ED 1990 PROCESSING AND TRANSMISSION OF SAFETY INFORMATION
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
EN 50129 : 2003 COR 2010 RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED ELECTRONIC SYSTEMS FOR SIGNALLING
EN 61025:2007 Fault tree analysis (FTA)
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 10118-2:2010 Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher
UIC A155 RP 4 : 1984 A SURVEY OF THE AVAILABLE MEASURES FOR THE PROTECTION OF SAFETY INFORMATION DURING TRANSMISSION
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.