ISO/IEC 13888-1:2009
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology Security techniques Non-repudiation Part 1: General
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
09-08-2020
English
07-09-2009
ISO/IEC 13888 is concerned with non-repudiation. ISO/IEC 13888-1:2009 is a general part which defines a model for non-repudiation mechanisms providing evidence based on cryptographic check values generated using symmetric or asymmetric cryptographic techniques. Non-repudiation mechanisms provide protocols for the exchange of non-repudiation tokens for non-repudiation services. Specific and additional non-repudiation services are described.
DocumentType |
Standard
|
Pages |
19
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
Standards | Relationship |
INCITS/ISO/IEC 13888-1 : 2004 | Identical |
BS ISO/IEC 13888-1:2009 | Identical |
CSA ISO/IEC 13888-1:2010(R2020) | Identical |
NEN ISO/IEC 13888-1 : 2004 | Identical |
CSA ISO/IEC 13888-1:2010 | Identical |
CSA ISO/IEC 13888-1 : 2010 : R2015 | Identical |
03/652482 DC : DRAFT JUNE 2003 | BS ISO/IEC 13335-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MANAGEMENT OF INFORMATION AND COMMUNICATIONS TECHNOLOGY SECURITY - PART 1: CONCEPTS AND MODELS FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY SECURITY MANAGEMENT |
08/30169511 DC : DRAFT DEC 2008 | BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO/IEC 13888-2:2010 | Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques |
09/30204721 DC : 0 | BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
BS ISO/IEC TR 13335-5:2001 | Information technology. Guidelines for the management of IT security Management guidance of network security |
CSA ISO/IEC TR 14516 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
BS ISO/IEC 9798-1:2010 | Information technology. Security techniques. Entity authentication General |
CAN/CSA-ISO/IEC TR 14516-04 (R2017) | Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
BS ISO/IEC 17799 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
CSA ISO/IEC TR 14516 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
BS ISO/IEC 18028-5:2006 | Information technology. Security techniques. IT network security Securing communications across networks using virtual private networks |
EG 202 009-1 : 1.3.1 | USER GROUP; QUALITY OF TELECOM SERVICES; PART 1: METHODOLOGY FOR IDENTIFICATION OF INDICATORS RELEVANT TO THE USERS |
12/30236961 DC : 0 | BS ISO/IEC 20008-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURES - PART 1: GENERAL |
BS ISO/IEC 20008-1:2013 | Information technology. Security techniques. Anonymous digital signatures General |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
INCITS/ISO/IEC 17799 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
CSA ISO/IEC 13888-3 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 15945-04 (R2017) | Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
I.S. CWA 14365-1:2004 | GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 1: LEGAL AND TECHNICAL ASPECTS |
INCITS/ISO/IEC 18028-5 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS BETWEEN NETWORKS USING VIRTUAL PRIVATE NETWORKS |
ISO/IEC 17960:2015 | Information technology Programming languages, their environments and system software interfaces Code signing for source code |
ISO/IEC 13888-3:2009 | Information technology Security techniques Non-repudiation Part 3: Mechanisms using asymmetric techniques |
BS 7799-1(2005) : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
TR 102 045 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE POLICY FOR EXTENDED BUSINESS MODEL |
04/30062174 DC : DRAFT JUN 2004 | ISO/IEC FCD 17799 - INFORMATION TECHNOLOGY - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
BS ISO/IEC 17960:2015 | Information technology. Programming languages, their environments and system software interfaces. Code signing for source code |
BS ISO/IEC 13888-3:1997 | Information technology. Security techniques. Non-repudiation Mechanisms using asymmetric techniques |
BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
TS 118 111 : 2.4.1 | ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2) |
TR 102 272 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES |
12/30186137 DC : 0 | BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CSA ISO/IEC 9798-1 :2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
TR 102 206 : 1.1.3 | MOBILE COMMERCE (M-COMM); MOBILE SIGNATURE SERVICE; SECURITY FRAMEWORK |
CSA ISO/IEC 18028-5 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
CAN/CSA-ISO/IEC 17960:16 | Information technology Programming languages, their environments and system software interfaces Code signing for source code (Adopted ISO/IEC 17960:2015, first edition, 2015-09-01) |
ISO/IEC 18028-5:2006 | Information technology Security techniques IT network security Part 5: Securing communications across networks using virtual private networks |
BS ISO/IEC 13888-2:2010 | Information technology. Security techniques. Non-repudiation Mechanisms using symmetric techniques |
DD IEC/TS 62351-2:2008 | Power systems management and associated information exchange. Data and communications security Glossary of terms |
03/652682 DC : DRAFT NOV 2003 | BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
ES 201 733 : 1.1.3 | ELECTRONIC SIGNATURE FORMATS |
TR 102 605 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED E-MAIL |
CAN/CSA-ISO/IEC 9798-1:12 (R2016) | Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01) |
INCITS/ISO/IEC 18028-1 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
CSA ISO/IEC 15945 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
SR 003 391 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
ISO/IEC 17799:2005 | Information technology Security techniques Code of practice for information security management |
I.S. CWA 14365:2003 | GUIDE ON THE USE OF ELECTRONIC SIGNATURES |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
05/30104603 DC : DRAFT JUN 2005 | ISO/IEC FCD 18028-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
09/30169508 DC : 0 | BS ISO/IEC 13888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
CSA ISO/IEC 15945 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 13888-3:2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO/IEC TR 13335-5:2001 | Information technology Guidelines for the management of IT Security Part 5: Management guidance on network security |
ISO/IEC 20008-1:2013 | Information technology — Security techniques — Anonymous digital signatures — Part 1: General |
ISO/IEC 13888-2:2010 | Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
ISO/IEC 10181-4:1997 | Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4: |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010 | Information technology Security techniques Entity authentication Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.