• Shopping Cart
    There are no items in your cart

ISO/IEC 13888-1:2009

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

Information technology — Security techniques — Non-repudiation — Part 1: General

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

09-07-2009

Withdrawn date

09-04-2025

Superseded by

ISO/IEC 13888-1:2020

€63.00
Excluding VAT

ISO/IEC 13888 is concerned with non-repudiation. ISO/IEC 13888-1:2009 is a general part which defines a model for non-repudiation mechanisms providing evidence based on cryptographic check values generated using symmetric or asymmetric cryptographic techniques. Non-repudiation mechanisms provide protocols for the exchange of non-repudiation tokens for non-repudiation services. Specific and additional non-repudiation services are described.

Committee
ISO/IEC JTC 1/SC 27
DocumentType
Standard
Pages
19
PublisherName
International Organization for Standardization
Status
Withdrawn
SupersededBy
Supersedes

Standards Relationship
INCITS/ISO/IEC 13888-1 : 2004 Identical
BS ISO/IEC 13888-1:2009 Identical
NEN ISO/IEC 13888-1 : 2004 Identical

03/652482 DC : DRAFT JUNE 2003 BS ISO/IEC 13335-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MANAGEMENT OF INFORMATION AND COMMUNICATIONS TECHNOLOGY SECURITY - PART 1: CONCEPTS AND MODELS FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY SECURITY MANAGEMENT
08/30169511 DC : DRAFT DEC 2008 BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
ISO/IEC 13888-2:2010 Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques
09/30204721 DC : 0 BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL
BS ISO/IEC TR 13335-5:2001 Information technology. Guidelines for the management of IT security Management guidance of network security
BS ISO/IEC 9798-1:2010 Information technology. Security techniques. Entity authentication General
BS ISO/IEC 17799 : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT
INCITS/ISO/IEC 15945 : 2002 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
INCITS/ISO/IEC 15945 : 2002 : R2007 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES
IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
BS ISO/IEC 18028-5:2006 Information technology. Security techniques. IT network security Securing communications across networks using virtual private networks
ETSI EG 202 009-1 V1.3.1 (2014-12) User Group; Quality of telecom services; Part 1: Methodology for identification of indicators relevant to the Users
12/30236961 DC : 0 BS ISO/IEC 20008-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURES - PART 1: GENERAL
BS ISO/IEC 20008-1:2013 Information technology. Security techniques. Anonymous digital signatures General
ISO/IEC TR 14516:2002 Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services
INCITS/ISO/IEC 17799 : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT
BS ISO/IEC 15945:2002 Information technology. Security techniques. Specification of TTP services to support the application of digital signatures
I.S. CWA 14365-1:2004 GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 1: LEGAL AND TECHNICAL ASPECTS
INCITS/ISO/IEC 18028-5 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS BETWEEN NETWORKS USING VIRTUAL PRIVATE NETWORKS
ISO/IEC 17960:2015 Information technology — Programming languages, their environments and system software interfaces — Code signing for source code
ISO/IEC 13888-3:2009 Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques
BS 7799-1(2005) : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT
04/30062174 DC : DRAFT JUN 2004 ISO/IEC FCD 17799 - INFORMATION TECHNOLOGY - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT
BS ISO/IEC 17960:2015 Information technology. Programming languages, their environments and system software interfaces. Code signing for source code
BS ISO/IEC 13888-3:1997 Information technology. Security techniques. Non-repudiation Mechanisms using asymmetric techniques
BS ISO/IEC TR 14516:2002 Information technology. Security techniques. Guidelines for the use and management of trusted third party services
12/30186137 DC : 0 BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS
ISO/IEC 18028-5:2006 Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networks
BS ISO/IEC 13888-2:2010 Information technology. Security techniques. Non-repudiation Mechanisms using symmetric techniques
DD IEC/TS 62351-2:2008 Power systems management and associated information exchange. Data and communications security Glossary of terms
03/652682 DC : DRAFT NOV 2003 BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS
ETSI ES 201 733 V1.1.3 (2000-05) Electronic Signature Formats
INCITS/ISO/IEC 18028-1 : 2008 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT
ISO/IEC 17799:2005 Information technology — Security techniques — Code of practice for information security management
I.S. CWA 14365:2003 GUIDE ON THE USE OF ELECTRONIC SIGNATURES
ISO/IEC 9798-1:2010 Information technology — Security techniques — Entity authentication — Part 1: General
05/30104603 DC : DRAFT JUN 2005 ISO/IEC FCD 18028-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS
09/30169508 DC : 0 BS ISO/IEC 13888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
ISO/IEC TR 13335-5:2001 Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security
ISO/IEC 20008-1:2013 Information technology — Security techniques — Anonymous digital signatures — Part 1: General
UNE-ETSI/TS 101733 V1.2.2:2011 Electronic signature formats.

ISO/IEC 13888-2:2010 Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques
ISO/IEC TR 14516:2002 Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services
ISO/IEC 10181-1:1996 Information technology — Open Systems Interconnection — Security frameworks for open systems: Overview
ISO/IEC 9594-8:2017 Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks
ISO 7498-2:1989 Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture
ISO/IEC 10118-1:2016 Information technology — Security techniques — Hash-functions — Part 1: General
ISO/IEC 10181-4:1997 Information technology — Open Systems Interconnection — Security frameworks for open systems: Non-repudiation framework — Part 4:
ISO/IEC 11770-3:2015 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology — Security techniques — Entity authentication — Part 1: General

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

€63.00
Excluding VAT