ISO/IEC 13888-2:1998 PDF

ISO/IEC 13888-2:1998 PDF

Name:
ISO/IEC 13888-2:1998 PDF

Published Date:
04/01/1998

Status:
Active

Description:

Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques (publiÇ en anglais seulement)

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$19.5
Need Help?

The goal of the non-repudiation service is to generate, collect, maintain, make available and validate evidence concerning a claimed event or action in order to resolve disputes about the occurrence or non occurrence of the event or action. This part of ISO/IEC 13888 provides descriptions of generic structures that can be used for non-repudiation services, and of some specific, communication related mechanisms which can be used to provide non-repudiation of origin (NRO), non-repudiation of delivery (NRD), non-repudiation of submission (NRS), and non-repudiation of transport (NRT) services. Other non-repudiation services can be built using the generic structures described in Clause 8 in order to meet the requirements defined by the security policy.

This part of ISO/IEC 13888 relies on the existence of a trusted third party (TTP) to prevent fraudulent repudiation. Usually an on-line trusted third party is needed.

Non-repudiation mechanisms provide protocols for the exchange of non-repudiation tokens specific to each non-repudiation service. Non-repudiation tokens used in this part consist of Secure Envelopes and additional data. Non-repudiation tokens shall be stored as non-repudiation information that may be used subsequently in case of disputes.

Depending on the non-repudiation policy in effect for a specific application, and the legal environment within which the application operates, additional information may be required to complete the non-repudiation information, e.g.,

  • evidence including a trusted time stamp provided by a Time Stamping Authority,
  • evidence provided by a notary which provides assurance about the action or event performed by one or more entities.

Non-repudiation can only be provided within the context of a clearly defined security policy for a particular application and its legal environment. Non-repudiation policies are described in ISO/IEC 10181-4.


File Size : 1 file , 73 KB
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 10
Published : 04/01/1998

History

ISO/IEC 13888-2:2010/Cor1:2012
Published Date: 12/15/2012
Corrigendum
Free Download
ISO/IEC 13888-2:2010
Published Date: 12/15/2010
Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques
$37.2
ISO/IEC 13888-2:1998
Published Date: 04/01/1998
Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques (publiÇ en anglais seulement)
$19.5

Related products

ISO/IEC 8859-9:1999
Published Date: 01/01/1999
Information technology - 8-bit single-byte coded graphic character sets - Part 9: Latin alphabet No. 5
$24.3
ISO/IEC 29159-1:2010
Published Date: 09/01/2010
Information technology - Biometric calibration, augmentation and fusion data - Part 1: Fusion information format
$49.8

Best-Selling Products

ICAC EP-7
Published Date: 01/01/2004
ELECTROSTATIC PRECIPITATOR GAS FLOW MODEL STUDIES
ICAC EP-8
Published Date: 11/01/1993
Structural Design Criteria for Electrostatic Precipitator Casings
ICAC F-3
Published Date: 01/01/2002
Operation and Maintenance of Fabric Collectors
ICAC WP-1
Published Date: 05/01/2009
White Paper: Selective Catalytic Reduction (SCR) Controls for NO x Emissions from Fossil Fuel-Fired Electric Power Plants