• There are no items in your cart

CEN ISO/TS 19299:2015

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

Electronic fee collection - Security framework (ISO/TS 19299:2015)

Withdrawn date

24-10-2024

Superseded by

EN ISO 19299:2020

Published date

14-10-2015

Sorry this product is not available in your region.

European foreword
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Trust model
6 Security requirements
7 Security measures - countermeasures
8 Security specifications for interoperable interface
  implementation
9 Key management
Annex A (normative) - Security profiles
Annex B (normative) - Implementation conformance
        statement (ICS) proforma
Annex C (informative) - Stakeholder objectives and
        generic requirements
Annex D (informative) - Threat analysis
Annex E (informative) - Security policies
Annex F (informative) - Example for an EETS security
        policy
Annex G (informative) - Recommendations for
        privacy-focused implementation
Annex H (informative) - Proposal for end-entity certificates
Bibliography

The overall scope of ISO/TS 19299:2015 is an information security framework for all organizational and technical entities of an EFC scheme and in detail for the interfaces between them, based on the system architecture defined in ISO 17573. The security framework describes a set of requirements and associated security measures for stakeholders to implement and thus ensure a secure operation of their part of an EFC system as required for a trustworthy environment according to its security policy.The scope of ISO/TS 19299:2015 comprises the following:definition of a trust model; Basic assumptions and principles for establishing trust between the stakeholders.security requirements; security measures - countermeasures; Security requirements to support actual EFC system implementations.security specifications for interface implementation; These specifications represent an add-on for security to the corresponding standards.key management; Covering the (initial) setup of key exchange between stakeholders and several operational procedures like key renewal, certificate revocation, etc.security profiles; implementation conformance statement provides a checklist to be used by an equipment supplier, a system implementation, or an actor of a role declaring his conformity to ISO/TS 19299:2015; general information security objectives of the stakeholders which provide a basic motivation for the security requirements; threat analysis on the EFC system model and its assets using two different complementary methods, an attack-based analysis, and an asset-based analysis; security policy examples; recommendations for privacy-focused implementation; proposal for end-entity certificates.

Committee
CEN/TC 278
DevelopmentNote
Supersedes CEN/TS 16439. (10/2015)
DocumentType
Technical Specification
PublisherName
Comite Europeen de Normalisation
Status
Withdrawn
SupersededBy
Supersedes

PD CEN/TR 16968:2016 Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication
CEN/TR 16968:2016 Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication
S.R. CEN/TS 16986:2016 ELECTRONIC FEE COLLECTION - INTEROPERABLE APPLICATION PROFILES FOR INFORMATION EXCHANGE BETWEEN SERVICE PROVISION AND TOLL CHARGING
PD CEN/TS 16986:2016 Electronic Fee Collection. Interoperable application profiles for information exchange between Service Provision and Toll Charging
S.R. CEN/TR 16968:2016 ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO 15782-1:2009 Certificate management for financial services Part 1: Public key certificates
ISO 12855:2015 Electronic fee collection Information exchange between service provision and toll charging
ISO/IEC 9646-7:1995 Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 8825-2:2015 Information technology ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) Part 2:
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 27003:2017 Information technology — Security techniques — Information security management systems — Guidance
EN 15509:2014 Electronic fee collection - Interoperability application profile for DSRC
ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO 17573:2010 Electronic fee collection Systems architecture for vehicle-related tolling
TR 102 893 : 1.1.1 INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; THREAT, VULNERABILITY AND RISK ANALYSIS (TVRA)
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 8825-4:2015 Information technology ASN.1 encoding rules: XML Encoding Rules (XER) Part 4:
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
FIPS PUB 140-2 : 0 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
CEN/TS 16702-1:2014 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
ISO/TS 14907-2:2016 Electronic fee collection Test procedures for user and fixed equipment Part 2: Conformance test for the on-board unit application interface
CEN/TR 16690:2014 Electronic fee collection - Guidelines for EFC applications based on in-vehicle ITS stations
ISO/IEC 10181-1:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Overview
ISO/TS 17575-1:2010 Electronic fee collection Application interface definition for autonomous systems Part 1: Charging
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
ISO 14906:2011 Electronic fee collection Application interface definition for dedicated short-range communication
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 14888-1:2008 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
CEN/TR 16092:2011 Electronic fee collection - Requirements for pre-payment systems
ISO/IEC 7816-3:2006 Identification cards — Integrated circuit cards — Part 3: Cards with contacts — Electrical interface and transmission protocols
ISO/TS 13141:2010 Electronic fee collection Localisation augmentation communication for autonomous systems
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/TS 12813:2009 Electronic fee collection Compliance check communication for autonomous systems
CEN/TS 16702-2:2015 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder
ISO/TS 17575-3:2011 Electronic fee collection Application interface definition for autonomous systems Part 3: Context data
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
ISO/IEC 14888-2:2008 Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.