EG 201 383 : 1.1.1
|
METHODS FOR TESTING AND SPECIFICATION (MTS) - USE OF SDL IN ETSI DELIVERABLES - GUIDELINES FOR FACILITATING VALIDATION AND THE DEVELOPMENT OF CONFORMANCE TESTS |
TS 102 165-2 : 4.2.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES |
TS 102 237-1 : 4.1.1
|
TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; INTEROPERABILITY TEST METHODS AND APPROACHES; PART 1: GENERIC APPROACH TO INTEROPERABILITY TESTING |
ISO/IEC 15408-2:2008
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ES 202 382 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES |
ETR 232 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
ISO/IEC 9798-3:1998
|
Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
EG 201 015 : 2.1.1
|
METHODS FOR TESTING AND SPECIFICATION (MTS); STANDARDS ENGINEERING PROCESS; A HANDBOOK OF VALIDATION METHODS |
ES 202 383 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS |
ETR 237 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
EG 202 107 : 1.1.1
|
METHODS FOR TESTING AND SPECIFICATION (MTS) - PLANNING FOR VALIDATION AND TESTING IN THE STANDARDS-MAKING PROCESS |
ISO/IEC 15408-3:2008
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
TS 102 165-1 : 4.2.3
|
CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
EG 202 106 : 2.1.1
|
METHODS FOR TESTING AND SPECIFICATION (MTS); GUIDELINES FOR THE USE OF FORMAL SDL AS A DESCRIPTIVE TOOL |
ETR 184 : 20001
|
METHODS FOR TESTING AND SPECIFICATION (MTS); OVERVIEW OF VALIDATION TECHNIQUES FOR EUROPEAN TELECOMMUNICATION STANDARDS (ETSS) CONTAINING SDL |
EG 201 058 : 1.2.4
|
METHODS FOR TESTING AND SPECIFICATION (MTS); IMPLEMENTATION CONFORMANCE STATEMENT (ICS) PROFORMA STYLE GUIDE |
TR 101 052 : 1.1.1
|
SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD AUTHENTICATION AND KEY MANAGEMENT ALGORITHM SET TAA1 |
EG 201 872 : 1.2.1
|
METHODS FOR TESTING AND SPECIFICATIONS; METHODOLOGICAL APPROACH TO THE USE OF OBJECT-ORIENTATION DESIGN IN THE STANDARDS MAKING PROCESS |
ISO/IEC 9798-2:2008
|
Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
EN 300 396-6 : 1.5.1
|
TERRESTRIAL TRUNKED RADIO (TETRA); DIRECT MODE OPERATION (DMO); PART 6: SECURITY |
ISO/IEC 10181-4:1997
|
Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4: |
SR 001 262 : 2.0.0
|
ETSI DRAFTING RULES |
ETS 300 406 : 20001
|
METHODS FOR TESTING AND SPECIFICATION (MTS) - PROTOCOL AND PROFILE CONFORMANCE TESTING SPECIFICATIONS - STANDARDIZATION METHODOLOGY |
ISO/IEC 15408-1:2009
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ETR 332 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG) |
EN 300 392-7 : 3.3.1
|
TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY |
ISO/IEC 9798-1:2010
|
Information technology Security techniques Entity authentication Part 1: General |