Committee
|
TC 224 |
Development Note
|
Supersedes DIN EN 16248-1. (05/2013) |
Document Type
|
Standard |
ISBN
|
|
Pages
|
|
Published
|
|
Publisher
|
German Institute for Standardisation (Deutsches Institut für Normung)
|
Status
|
Current |
Supersedes
|
|
EN 419251-2:2013
|
Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
EN 419251-3:2013
|
Security requirements for device for authentication - Part 3: Additional functionality for security targets |
ISO/IEC 15408-2:2008
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
PREN 14169-3 : DRAFT 2010
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 3: DEVICE WITH KEY IMPORT |
ISO/IEC 15408-3:2008
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
PREN 14169-5 : DRAFT 2010
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 5: DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION |
PREN 14169-2 : DRAFT 2010
|
PROTECTION PROFILE FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
PREN 14169-6 : DRAFT 2010
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: DEVICE WITH KEY IMPORT AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION |
ISO/IEC 10181-2:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
PREN 14169-4 : DRAFT 2010
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 4: EXTENSION FOR DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH CERTIFICATE GENERATION APPLICATION |
ISO/IEC 15408-1:2009
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ISO/IEC 18045:2008
|
Information technology — Security techniques — Methodology for IT security evaluation |
Unfortunately, this product is not available for purchase in your region.
-
Access your standards online with a subscription
Features
- Simple online access to standards, technical information and regulations
- Critical updates of standards and customisable alerts and notifications
- Multi - user online standards collection: secure, flexibile and cost effective