CEI EN 50159 : 2012
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
Hardcopy , PDF
06-18-2020
English
01-01-2012
Introduction
1 Scope
2 Normative references
3 Terms, definitions and abbreviations
4 Reference architecture
5 Threats to the transmission system
6 Classification of transmission systems
7 Requirements for defences
Annex A (informative) - Threats on open transmission systems
Annex B (informative) - Categories of transmission systems
Annex C (informative) - Guideline for defences
Annex D (informative) - Guidelines for use of the standard
Annex E (informative) - Mapping from previous standards
Annex ZZ (informative) - Coverage of Essential Requirements
of EC Directives
Pertains to safety-related electronic systems using for digital communication purposes a transmission system which was not necessarily designed for safety-related applications and which is: - under the control of the designer and fixed during the lifetime, or - partly unknown or not fixed, however unauthorised access can be excluded, or - not under the control of the designer, and also unauthorised access has to be considered.
Committee |
CT 9
|
DevelopmentNote |
Classificazione CEI 9-127. Supersedes CEI EN 50159-1 & CEI EN 50159-2. (02/2012)
|
DocumentType |
Standard
|
Pages |
68
|
PublisherName |
Comitato Elettrotecnico Italiano
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
Standards | Relationship |
EN 50159:2010 | Identical |
IEC 61025:2006 | Fault tree analysis (FTA) |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 10118-4:1998 | Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
2008/57/EC : 2008 AMD 5 2014 | DIRECTIVE 2008/1957/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 17 JUNE 2008 ON THE INTEROPERABILITY OF THE RAIL SYSTEM WITHIN THE COMMUNITY (RECAST) (TEXT WITH EEA RELEVANCE) |
ISO/IEC 9979:1999 | Information technology Security techniques Procedures for the registration of cryptographic algorithms |
FIPS PUB 197 : 2001 | ADVANCED ENCRYPTION STANDARD (AES) |
UIC 738 : 2ED 1990 | PROCESSING AND TRANSMISSION OF SAFETY INFORMATION |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
EN 50129 : 2003 COR 2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED ELECTRONIC SYSTEMS FOR SIGNALLING |
EN 61025:2007 | Fault tree analysis (FTA) |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
UIC A155 RP 4 : 1984 | A SURVEY OF THE AVAILABLE MEASURES FOR THE PROTECTION OF SAFETY INFORMATION DURING TRANSMISSION |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.