17/30349181 DC : 0
NA
NA
Status of Standard is Unknown
BS ISO/IEC 24760-1 AMENDMENT 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IDENTITY MANAGEMENT - PART 1: TERMINOLOGY AND CONCEPTS
Available format(s)
Hardcopy , PDF
Language(s)
English
Publisher
€22.71
Excluding VAT
Foreword
Introduction
1 Scope
2 Modifications to the base document
BS ISO/IEC 24760-1 AMENDMENT 1.
| Committee |
IST/33/5
|
| DocumentType |
Draft
|
| Pages |
15
|
| PublisherName |
British Standards Institution
|
| Status |
NA
|
| ISO/IEC 9798-3:1998 | Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques |
| ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management |
| ISO 19092:2008 | Financial services — Biometrics — Security framework |
| ISO/IEC 9798-4:1999 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function |
| ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
| ISO/IEC 9798-2:2008 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms |
| ISO/IEC 9594-8:2017 | Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks |
| ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
| ISO/IEC 29101:2013 | Information technology — Security techniques — Privacy architecture framework |
| ISO 9001:2015 | Quality management systems — Requirements |
| ISO/IEC 9798-6:2010 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer |
| ISO/IEC TR 27008:2011 | Information technology — Security techniques — Guidelines for auditors on information security controls |
| ISO/IEC 9594-2:2017 | Information technology — Open Systems Interconnection — The Directory — Part 2: Models |
| ISO/IEC 27007:2017 | Information technology — Security techniques — Guidelines for information security management systems auditing |
| ANSI INCITS 359 : 2012 | INFORMATION TECHNOLOGY - ROLE BASED ACCESS CONTROL |
| ISO/IEC 9798-1:2010 | Information technology — Security techniques — Entity authentication — Part 1: General |
| ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Summarise
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.