• Shopping Cart
    There are no items in your cart

CSA ISO/IEC 18014-1 : 2009

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 1: FRAMEWORK

Available format(s)

Hardcopy , PDF

Superseded date

23-11-2014

Language(s)

English

Published date

01-01-2014

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 General
6 Communications between entities involved
7 Message Formats
Annex A (normative) - ASN.1 Module for time-stamping
Annex B (normative) - Excerpt of the Cryptographic Message
        Syntax
Bibliography

Specifies: - the objective of a time-stamping authority; - a general model on which time-stamping services are based; - time-stamping services; and - the basic protocols between the involved entities.

DocumentType
Standard
Pages
44
ProductNote
Reconfirmed EN
PublisherName
Canadian Standards Association
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 18014-1:2008 Identical

ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC TR 14516:2002 Information technology Security techniques Guidelines for the use and management of Trusted Third Party services
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 8824-2:2015 Information technology Abstract Syntax Notation One (ASN.1): Information object specification Part 2:
ISO 19108:2002 Geographic information Temporal schema
ISO 8601:2004 Data elements and interchange formats Information interchange Representation of dates and times
ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.