ISO/IEC 13888-1:2009
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Non-repudiation — Part 1: General
Hardcopy , PDF
English
09-07-2009
09-04-2025
ISO/IEC 13888 is concerned with non-repudiation. ISO/IEC 13888-1:2009 is a general part which defines a model for non-repudiation mechanisms providing evidence based on cryptographic check values generated using symmetric or asymmetric cryptographic techniques. Non-repudiation mechanisms provide protocols for the exchange of non-repudiation tokens for non-repudiation services. Specific and additional non-repudiation services are described.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
19
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| Supersedes |
| Standards | Relationship |
| INCITS/ISO/IEC 13888-1 : 2004 | Identical |
| BS ISO/IEC 13888-1:2009 | Identical |
| NEN ISO/IEC 13888-1 : 2004 | Identical |
| 03/652482 DC : DRAFT JUNE 2003 | BS ISO/IEC 13335-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MANAGEMENT OF INFORMATION AND COMMUNICATIONS TECHNOLOGY SECURITY - PART 1: CONCEPTS AND MODELS FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY SECURITY MANAGEMENT |
| 08/30169511 DC : DRAFT DEC 2008 | BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| ISO/IEC 13888-2:2010 | Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques |
| 09/30204721 DC : 0 | BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
| BS ISO/IEC TR 13335-5:2001 | Information technology. Guidelines for the management of IT security Management guidance of network security |
| BS ISO/IEC 9798-1:2010 | Information technology. Security techniques. Entity authentication General |
| BS ISO/IEC 17799 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
| INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
| INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
| IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
| ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
| BS ISO/IEC 18028-5:2006 | Information technology. Security techniques. IT network security Securing communications across networks using virtual private networks |
| ETSI EG 202 009-1 V1.3.1 (2014-12) | User Group; Quality of telecom services; Part 1: Methodology for identification of indicators relevant to the Users |
| 12/30236961 DC : 0 | BS ISO/IEC 20008-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURES - PART 1: GENERAL |
| BS ISO/IEC 20008-1:2013 | Information technology. Security techniques. Anonymous digital signatures General |
| ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services |
| INCITS/ISO/IEC 17799 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
| BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
| I.S. CWA 14365-1:2004 | GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 1: LEGAL AND TECHNICAL ASPECTS |
| INCITS/ISO/IEC 18028-5 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS BETWEEN NETWORKS USING VIRTUAL PRIVATE NETWORKS |
| ISO/IEC 17960:2015 | Information technology — Programming languages, their environments and system software interfaces — Code signing for source code |
| ISO/IEC 13888-3:2009 | Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques |
| BS 7799-1(2005) : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
| 04/30062174 DC : DRAFT JUN 2004 | ISO/IEC FCD 17799 - INFORMATION TECHNOLOGY - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
| BS ISO/IEC 17960:2015 | Information technology. Programming languages, their environments and system software interfaces. Code signing for source code |
| BS ISO/IEC 13888-3:1997 | Information technology. Security techniques. Non-repudiation Mechanisms using asymmetric techniques |
| BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
| 12/30186137 DC : 0 | BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
| ISO/IEC 18028-5:2006 | Information technology — Security techniques — IT network security — Part 5: Securing communications across networks using virtual private networks |
| BS ISO/IEC 13888-2:2010 | Information technology. Security techniques. Non-repudiation Mechanisms using symmetric techniques |
| DD IEC/TS 62351-2:2008 | Power systems management and associated information exchange. Data and communications security Glossary of terms |
| 03/652682 DC : DRAFT NOV 2003 | BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
| ETSI ES 201 733 V1.1.3 (2000-05) | Electronic Signature Formats |
| INCITS/ISO/IEC 18028-1 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
| ISO/IEC 17799:2005 | Information technology — Security techniques — Code of practice for information security management |
| I.S. CWA 14365:2003 | GUIDE ON THE USE OF ELECTRONIC SIGNATURES |
| ISO/IEC 9798-1:2010 | Information technology — Security techniques — Entity authentication — Part 1: General |
| 05/30104603 DC : DRAFT JUN 2005 | ISO/IEC FCD 18028-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
| 09/30169508 DC : 0 | BS ISO/IEC 13888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
| ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security |
| ISO/IEC 20008-1:2013 | Information technology — Security techniques — Anonymous digital signatures — Part 1: General |
| UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
| ISO/IEC 13888-2:2010 | Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques |
| ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services |
| ISO/IEC 10181-1:1996 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Overview |
| ISO/IEC 9594-8:2017 | Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks |
| ISO 7498-2:1989 | Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture |
| ISO/IEC 10118-1:2016 | Information technology — Security techniques — Hash-functions — Part 1: General |
| ISO/IEC 10181-4:1997 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Non-repudiation framework — Part 4: |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
| ISO/IEC 9798-1:2010 | Information technology — Security techniques — Entity authentication — Part 1: General |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.