• I.S. CWA 14365-2:2004

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 2: PROTECTION PROFILE FOR SOFTWARE SIGNATURE CREATION DEVICES

    Available format(s):  Hardcopy, PDF

    Withdrawn date:  13-05-2021

    Language(s):  English

    Published date:  01-01-2004

    Publisher:  National Standards Authority of Ireland

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    1 Scope
    2 References
      2.1 Normative References
      2.2 Informative References
    3 Definitions and abbreviations
      3.1 Definitions
      3.2 Abbreviations
    4 Comparison between SSCD PP and SCDev PP
      4.1 Threats, Assumptions, Policies, Objectives
      4.2 Security Functional Requirements
      4.3 Security Assurance Requirements, EAL
    Annex 1 (normative) Protection Profile for Signature
            Creation Devices

    Abstract - (Show below) - (Hide below)

    Specifies the security requirements for a signature-creation device that can be implemented in software, and thus fulfil a wider market need than the "Secure Signature-Creation Device" required for qualified electronic signatures.

    General Product Information - (Show below) - (Hide below)

    Development Note Supersedes I.S. CWA 14365 (05/2004)
    Document Type Standard
    Publisher National Standards Authority of Ireland
    Status Withdrawn
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective