• TR 103 304 : 1.1.1

    Current The latest, up-to-date edition.

    CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES

    Available format(s): 

    Language(s): 

    Published date:  16-08-2016

    Publisher:  European Telecommunications Standards Institute

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    Modal verbs terminology
    Executive summary
    1 Scope
    2 References
    3 Definitions and abbreviations
    4 Overview
    5 Threats to PII
    6 Technical aspects
    7 Use cases, actors and roles
    Annex A - Scenarios
    History

    Abstract - (Show below) - (Hide below)

    Provides a number of scenarios focusing on today's ICT and develops an analysis of possible threats to Personally Identifiable Information (PII) in mobile and cloud based services.

    General Product Information - (Show below) - (Hide below)

    Committee CYBER
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 11889-1:2015 Information technology Trusted platform module library Part 1: Architecture
    TS 119 612 : 2.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TRUSTED LISTS
    ISO/IEC 11889-2:2015 Information technology Trusted Platform Module Library Part 2: Structures
    ISO/IEC 11889-3:2015 Information technology Trusted Platform Module Library Part 3: Commands
    ISO/IEC 29191:2012 Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.
    ISO/IEC 29115:2013 Information technology Security techniques Entity authentication assurance framework
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    TR 101 567 : 1.1.1 LAWFUL INTERCEPTION (LI); CLOUD/VIRTUAL SERVICES FOR LAWFUL INTERCEPTION (LI) AND RETAINED DATA (RD)
    TS 101 331 : 1.4.1 LAWFUL INTERCEPTION (LI); REQUIREMENTS OF LAW ENFORCEMENT AGENCIES
    119999/5/EC : 1999 DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 9 MARCH 1999 ON RADIO EQUIPMENT AND TELECOMMUNICATIONS TERMINAL EQUIPMENT AND THE MUTUAL RECOGNITION OF THEIR CONFORMITY
    ISO/IEC 27040:2015 Information technology — Security techniques — Storage security
    TR 103 308 : 1.1.1 CYBER; SECURITY BASELINE REGARDING LI AND RD FOR NFV AND RELATED PLATFORMS
    TS 101 671 : 3.14.1 LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC
    ISO/IEC 17789:2014 Information technology — Cloud computing — Reference architecture
    ISO/IEC 11889-4:2015 Information technology Trusted Platform Module Library Part 4: Supporting Routines
    TR 187 010 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; REPORT ON ISSUES RELATED TO SECURITY IN IDENTITY MANAGEMENT AND THEIR RESOLUTION IN THE NGN
    ISO/IEC 29100:2011 Information technology — Security techniques — Privacy framework
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective