Search
×
FR

Placeholder headline

This is just a placeholder headline

API Technical Report TDB-6 Chapter 6 – Density

$

204

BUY NOW

Placeholder headline

This is just a placeholder headline

API STD 560: Fired Heaters for General Refinery Services

$

721

BUY NOW

Placeholder headline

This is just a placeholder headline

API STD 64: Diverter Equipment Systems

$

324

BUY NOW

Placeholder headline

This is just a placeholder headline

API MPMS CH 17.10.1: Refrigerated Light Hydrocarbon Fluids – Measurement of Cargoes on Board LNG Carries

$

417

BUY NOW

Placeholder headline

This is just a placeholder headline

API RP 13B-1: Testing Water-based Drilling Fluids

$

418

BUY NOW

Placeholder headline

This is just a placeholder headline

API Technical Report TDB-12 Chapter 12 – Thermal Conductivity

$

214

BUY NOW

Placeholder headline

This is just a placeholder headline

API 16FI Frac Iron Guidelines and Requirements

$

129

BUY NOW

ISO 14516:2002

ISO 14516:2002 Information technology – Security techniques – Guidelines for the use and management of Trusted Third Party services

CDN $273.00

SKU: 39a87086b73f Category:

Description

Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for

which general guidance is necessary to assist business entities, developers and providers of systems and services, etc.

This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP

services, the generic security requirements, who should provide what type of security, what the possible security

solutions are, and the operational use and management of TTP service security.

This Recommendation | Technical Report provides guidance for the use and management of TTPs, a clear definition of

the basic duties and services provided, their description and their purpose, and the roles and liabilities of TTPs and

entities using their services. It is intended primarily for system managers, developers, TTP operators and enterprise users

to select those TTP services needed for particular requirements, their subsequent management, use and operational

deployment, and the establishment of a Security Policy within a TTP. It is not intended to be used as a basis for a formal

assessment of a TTP or a comparison of TTPs.

This Recommendation | Technical Report identifies different major categories of TTP services including: time stamping,

non-repudiation, key management, certificate management, and electronic notary public. Each of these major categories

consists of several services which logically belong together.

Edition

1

Published Date

2002-06-27

Status

PUBLISHED

Pages

33

Language Detail Icon

English

Format Secure Icon

Secure PDF

Abstract

Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for

which general guidance is necessary to assist business entities, developers and providers of systems and services, etc.

This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP

services, the generic security requirements, who should provide what type of security, what the possible security

solutions are, and the operational use and management of TTP service security.

This Recommendation | Technical Report provides guidance for the use and management of TTPs, a clear definition of

the basic duties and services provided, their description and their purpose, and the roles and liabilities of TTPs and

entities using their services. It is intended primarily for system managers, developers, TTP operators and enterprise users

to select those TTP services needed for particular requirements, their subsequent management, use and operational

deployment, and the establishment of a Security Policy within a TTP. It is not intended to be used as a basis for a formal

assessment of a TTP or a comparison of TTPs.

This Recommendation | Technical Report identifies different major categories of TTP services including: time stamping,

non-repudiation, key management, certificate management, and electronic notary public. Each of these major categories

consists of several services which logically belong together.

Previous Editions

Can’t find what you are looking for?

Please contact us at: