
ISO 18014:2008
ISO 18014:2008 Information technology – Security techniques – Time-stamping services – Part 1: Framework
CDN $273.00
Description
ISO/IEC 18014 specifies time-stamping techniques. It consists of three parts, which include the general notion, models for a time-stamping service, data structures, and protocols.
ISO/IEC 18014-1:2008 describes a framework and defines the basic notion, the data structures, and protocols which are used for any time-stamping technique.
ISO/IEC 18014-1:2008:
- identifies the objective of a time-stamping authority;
- describes a general model on which time-stamping services are based;
- describes a process of generating and verifying time-stamp;
- defines the data structures of time-stamp token;
- defines the basic protocols of time-stamping;
- specifies the protocols between the involved entities.
Edition
2
Published Date
2008-08-26
Status
PUBLISHED
Pages
28
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
ISO/IEC 18014 specifies time-stamping techniques. It consists of three parts, which include the general notion, models for a time-stamping service, data structures, and protocols.
ISO/IEC 18014-1:2008 describes a framework and defines the basic notion, the data structures, and protocols which are used for any time-stamping technique.
ISO/IEC 18014-1:2008:
- identifies the objective of a time-stamping authority;
- describes a general model on which time-stamping services are based;
- describes a process of generating and verifying time-stamp;
- defines the data structures of time-stamp token;
- defines the basic protocols of time-stamping;
- specifies the protocols between the involved entities.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 27001:2024 Information security, cybersecurity and privacy protection – Information security management systems – Requirements – Amendment 1: Climate action changes
CDN $0.00 Add to cart -

ISO 20009:2022 Information security – Anonymous entity authentication – Part 3: Mechanisms based on blind signatures
CDN $173.00 Add to cart -

ISO 20243:2023 Information technology – Open Trusted Technology ProviderTM Standard (O-TTPS) – Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
CDN $273.00 Add to cart -

ISO 27562:2024 Information technology – Security techniques – Privacy guidelines for fintech services
CDN $273.00 Add to cart







