
ISO 29149:2012
ISO 29149:2012 Information technology – Security techniques – Best practices for the provision and use of time-stamping services
CDN $233.00
SKU: fa8b906c80af
Category: ICS:35.030
Description
ISO/IEC TR 29149:2012 explains how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms. It defines:
- how time-stamp requesters should use time-stamp token generation services;
- how TSAs (time-stamping authorities) should provide a service of guaranteed quality;
- how TSAs should deserve trust based on good practices;
- which algorithms and parameters should be used in TST (time-stamp token) generation and TST renewal, so that TSTs resist during the time period during which the TSTs can be verified as being valid;
- how time-stamp verifiers should use the time-stamp token verification services, both when validating individual TSTs, and when validating sequences of renewal TSTs.
Edition
1
Published Date
2012-03-05
Status
PUBLISHED
Pages
21
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
ISO/IEC TR 29149:2012 explains how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms. It defines:
- how time-stamp requesters should use time-stamp token generation services;
- how TSAs (time-stamping authorities) should provide a service of guaranteed quality;
- how TSAs should deserve trust based on good practices;
- which algorithms and parameters should be used in TST (time-stamp token) generation and TST renewal, so that TSTs resist during the time period during which the TSTs can be verified as being valid;
- how time-stamp verifiers should use the time-stamp token verification services, both when validating individual TSTs, and when validating sequences of renewal TSTs.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 27006:2021 Requirements for bodies providing audit and certification of information security management systems – Part 2: Privacy information management systems
CDN $115.00 Add to cart -

ISO 20008:2024 Information security – Anonymous digital signatures – Part 3: Mechanisms using multiple public keys
CDN $233.00 Add to cart -

ISO 27003:2017 Information technology – Security techniques – Information security management systems – Guidance
CDN $360.00 Add to cart -

ISO 27001:2024 Information security, cybersecurity and privacy protection – Information security management systems – Requirements – Amendment 1: Climate action changes
CDN $0.00 Add to cart







