M00043535
New product
TELECOMMUNICATIONS SECURITY; TRUSTED THIRD PARTIES (TTP); REQUIREMENTS FOR TTP SERVICES
European Telecommunications Standards Institute
In stock
Warning: Last items in stock!
Availability date: 11/06/2021
Intellectual property rights
Foreword
Introduction
1. Scope
2. References
3. Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4. General aspects
4.1 Use of a TTP
4.2 Delimitation of security services for confidentiality
and digital signatures
4.3 Establishing trust in a TTP scheme
4.4 TTP management
4.5 User interactions with TTPs
4.6 TTP services, functions and applications
5. TTP services and functions
5.1 Key management services for symmetric cryptosystems
5.2 Key management services for asymmetric cryptosystems
5.3 Key escrow/recovery services
5.4 Identification and authentication support services
5.5 Access control support services
5.6 Non-repudiation services
5.7 Auxiliary support services
5.8 Functions against services
6. TTP interfaces
6.1 Types of interface
6.2 Interface requirements
7. Legal aspects
7.1 Liability
7.2 Legal basis for digital signatures
7.3 Protection of privacy and personal data
7.4 Export control
7.5 Lawful interception
7.6 Lawful access
8. Commercial issues
8.1 Competition and openness
8.2 Scope and flexibility
8.3 Licensing and accreditation
8.4 Billing of TTP services
Annex A: Basis for a standardized TTP scheme
A.1 General standardization requirements
A.2 Security requirements for a TTP scheme
A.3 TTP functional and interface requirements to be
standardized
Annex B: Examples of the use of TTP services
B.1 TTP based security services
B.2 Certification authority
B.3 Key escrow/recovery centre
B.4 Trusted key distribution centre
B.5 Fraud detection centre
B.6 Legal services
B.7 Guaranteed date and time stamping
B.8 Negotiable document transaction
B.9 Storage of electronic information
Annex C: National and international policies
C.1 European Union
C.2 France
C.3 Germany
C.4 Netherlands
C.5 United Kingdom
C.6 OECD
C.7 United States of America
History
Describes the requirements for TTP services in order to safe guard the confidentiality of electronic information including key certification, key escrow/recovery, authentication, access control and non-repudiation services.
Published | |
Document Type | Standard |
Status | Current |
Publisher | European Telecommunications Standards Institute |
Pages | |
ISBN | |
Committee | SEC |