DIN EN 419251-3:2013-06
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
AAMI IEC TIR 80001-2-2 : 2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-2: GUIDANCE FOR THE DISCLOSURE AND COMMUNICATION OF MEDICAL DEVICE SECURITY NEEDS, RISKS AND CONTROLS |
ISO/IEC 29128:2011
|
Information technology — Security techniques — Verification of cryptographic protocols |
PD ISO/IEC TR 19791:2006
|
Information technology. Security techniques. Security assessment of operational systems |
BS EN 419251-2:2013
|
Security requirements for device for authentication Protection profile for extension for trusted channel to certificate generation application |
DIN EN 419211-2 E : 2013
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
DIN EN ISO 27789:2013-06
|
Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
ISO/IEC TR 15446:2017
|
Information technology Security techniques Guidance for the production of protection profiles and security targets |
ISO/IEC TR 20004:2015
|
Information technology Security techniques Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
BS EN 50436-6:2015
|
Alcohol interlocks. Test methods and performance requirements Data security |
BS EN 419211-6:2014
|
Protection profiles for secure signature creation device Extension for device with key import and trusted channel to signature creation application |
CAN/CSA-IEC 62443-2-1:17
|
Industrial communication networks — Network and system security — Part 2-1: Establishing an industrial automation and control system security program (Adopted IEC 62443-2-1:2010, first edition, 2010-11) | Réseaux industriels de communication — Sécurité dans les réseaux et les systèmes — Partie 2-1 : Établissement d’un programme de sécurité pour les systèmes d’automatisation et de commande industrielles (norme IEC 62443-2-1:2010 adoptée, première édition, 2010-11) |
05/30144069 DC : DRAFT DEC 2005
|
ISO 13491-1 - BANKING - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
UNI CEN ISO/TS 25110 : 2013
|
ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) |
PD CEN ISO/TS 14907-1:2015
|
Electronic fee collection. Test procedures for user and fixed equipment Description of test procedures |
ISO/IEC TS 19249:2017
|
Information technology Security techniques Catalogue of architectural and design principles for secure products, systems and applications |
BS ISO/IEC 30107-3:2017
|
Information technology. Biometric presentation attack detection Testing and reporting |
PREN 419221-5 : DRAFT 2016
|
PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
BS EN ISO 27789:2013
|
Health informatics. Audit trails for electronic health records |
13/30293476 DC : 0
|
BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
10/30156465 DC : DRAFT DEC 2010
|
BS EN ISO 27789 - HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS |
EN ISO/TS 17574 : 2004
|
ROAD TRANSPORT AND TRAFFIC TELEMATICS - ELECTRONIC FEE COLLECTION (EFC) - GUIDELINES FOR EFC SECURITY PROTECTION PROFILES |
DIN EN 419251-1 E : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
S.R. CEN ISO/TS 14907-1:2015
|
ELECTRONIC FEE COLLECTION - TEST PROCEDURES FOR USER AND FIXED EQUIPMENT - PART 1: DESCRIPTION OF TEST PROCEDURES (ISO/TS 14907-1:2015) |
07/30162803 DC : 0
|
BS ISO/IEC 18045 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - METHODOLOGY FOR IT SECURITY EVALUATION |
14/30275438 DC : 0
|
BS ISO/IEC 29167-12 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 12: CRYPTO SUITE ECC-DH SECURITY SERVICES FOR AIR INTERFACE COMMUNICATION |
CSA ISO/IEC TR 14516 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
DD IEC PAS 62601 : DRAFT MAR 2009
|
INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
I.S. EN 419212-4:2018
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS |
CSA ISO/IEC TR 14516 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
INCITS/ISO/IEC 15945 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
S.R. CEN ISO/TS 14441:2013
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF EHR SYSTEMS FOR USE IN CONFORMITY ASSESSMENT (ISO/TS 14441:2013) |
ANSI X9.117 : 2012
|
SECURE REMOTE ACCESS - MUTUAL AUTHENTICATION |
ISO/IEC TR 15443-3:2007
|
Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
S.R. CEN/TS 419221-2:2016
|
PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 2: CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITH BACKUP |
INCITS/ISO/IEC 15408-3 : 2013(R2018)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE REQUIREMENTS |
I.S. EN 50436-6:2015
|
ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
AAMI/IEC TIR80001-2-3:2012
|
APPLICATION OF RISK MANAGEMENT FOR IT-NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-3: GUIDANCE FOR WIRELESS NETWORKS |
PD CEN ISO/TS 25110:2013
|
Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
EN IEC 62443-4-1:2018
|
Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements |
I.S. EN ISO 27799:2016
|
HEALTH INFORMATICS - INFORMATION SECURITY MANAGEMENT IN HEALTH USING ISO/IEC 27002 |
16/30345816 DC : 0
|
BS EN 419212-4 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS |
I.S. CWA 14172-7:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 7: CRYPTOGRAPHIC MODULES USED BY CERTIFICATION SERVICE PROVIDERS FOR SIGNING OPERATIONS AND KEY GENERATION SERVICES |
EN ISO 25110:2017
|
Electronic fee collection - Interface definition for on-board account using integrated circuit card (ICC) (ISO 25110:2017) |
ISO/IEC 15945:2002
|
Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
CEN ISO/TS 17574:2017
|
Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017) |
CEN ISO/TS 25110:2013
|
Electronic fee collection - Interface definition for on-board account using integrated circuit card (ICC) (ISO/TS 25110:2013) |
EN 50436-6:2015
|
Alcohol interlocks - Test methods and performance requirements - Part 6: Data security |
EN 62601:2016
|
Industrial networks - Wireless communication network and communication profiles - WIA-PA |
EN 319 421 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING TIME-STAMPS |
UNE-EN 419211-2:2016
|
Protection profiles for secure signature creation device - Part 2: Device with key generation |
TR 102 780 : 1.1.1
|
METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS |
S.R. CEN/TS 419221-3:2016
|
PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 3: CRYPTOGRAPHIC MODULE FOR CSP KEY GENERATION SERVICES |
04/30091046 DC : DRAFT DEC 2004
|
ISO/IEC 19790 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
16/30329605 DC : 0
|
BS ISO/IEC 30107-3 - INFORMATION TECHNOLOGY - BIOMETRIC PRESENTATION ATTACK DETECTION - PART 3: TESTING AND REPORTING |
INCITS/ISO/IEC 15292 : 2001 : R2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
ISO 13491-2:2017
|
Financial services — Secure cryptographic devices (retail) — Part 2: Security compliance checklists for devices used in financial transactions |
BS ISO/IEC 15408-1:2009
|
Information technology. Security techniques. Evaluation criteria for IT security Introduction and general model |
ISO/IEC 30107-3:2017
|
Information technology — Biometric presentation attack detection — Part 3: Testing and reporting |
08/30091038 DC : DRAFT JUNE 2008
|
ISO/IEC 19792 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY EVALUATION OF BIOMETRICS |
ISO/IEC 15026-1:2013
|
Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
TS 102 573 : 2.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TRUST SERVICE PROVIDERS SIGNING AND/OR STORING DATA OBJECTS |
17/30351770 DC : 0
|
BS EN ISO 25110 - ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) |
DIN EN 419211-2:2013-12
|
Protection profiles for secure signature creation device - Part 2: Device with key generation |
BS ISO/IEC 19792:2009
|
Information technology. Security techniques. Security evaluation of biometrics |
PD IEC/TR 80001-2-9:2017
|
Application of risk management for it-networks incorporating medical devices Application guidance. Guidance for use of security assurance cases to demonstrate confidence in IEC TR 80001-2-2 security capabilities |
BS EN 419251-1:2013
|
Security requirements for device for authentication Protection profile for core functionality |
ISO/IEC 15408-3:2008
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
EG 202 549 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES |
ISO/IEC 29167-14:2015
|
Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications |
08/30133461 DC : 0
|
ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
EN 319 411-2 : 2.2.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 2: REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING EU QUALIFIED CERTIFICATES |
TR 187 013 : 3.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY ON IPTV SECURITY ARCHITECTURE |
ISO/IEC 29167-12:2015
|
Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communications |
13/30277648 DC : 0
|
BS EN 50436-6 - ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
07/30169475 DC : 0
|
BS ISO 15782-1 - CERTIFICATE MANAGEMENT FOR FINANCIAL SERVICES - PART 1: PUBLIC KEY CERTIFICATES |
CSA ISO/IEC 15292 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
DD ISO/TS 25237:2008
|
Health informatics. Pseudonymization |
BS ISO/IEC 15945:2002
|
Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
BS ISO 13491-2:2017
|
Financial services. Secure cryptographic devices (retail) Security compliance checklists for devices used in financial transactions |
CSA ISO/IEC 15408-1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
CAN/CSA-ISO/IEC 15945-04 (R2017)
|
Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
CSA ISO/IEC TR 15446 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
IEEE DRAFT 1074 : 0
|
DEVELOPING SOFTWARE LIFE CYCLE PROCESSES |
INCITS/ISO/IEC 15408-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
TR 185 012 : 3.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF SECURITY MECHANISMS FOR CUSTOMER PREMISES NETWORKS CONNECTED TO TISPAN NGN |
IEC 62443-2-1:2010
|
Industrial communication networks - Network and system security - Part 2-1: Establishing an industrial automation and control system security program |
UNE-ISO/IEC TR 19791:2013 IN
|
Information technology. Security techniques. Security assessment of operational systems |
UNE 71512:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL1» |
BIS IS 14990-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
I.S. CWA 14365-1:2004
|
GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 1: LEGAL AND TECHNICAL ASPECTS |
EG 202 387 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES |
TR 102 420 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY |
I.S. EN 62601:2016
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - WIA-PA |
PREN 419241-2 : DRAFT 2017
|
TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
UNI CEN ISO/TS 14441 : 2014
|
HEALTH INFORMATICS - SECURITY AND PRIVACY REQUIREMENTS OF HER SYSTEMS FOR USE IN CONFORMITY ASSESSMENT |
UNE 71511:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL3» |
I.S. CWA 14172-3:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 3: TRUSTWORTHY SYSTEMS MANAGING CERTIFICATES FOR ELECTRONIC SIGNATURES |
UNE 71513:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL3» |
UNE-ISO/IEC TR 15446:2013 IN
|
Information technology. Security techniques. Guide for the production of Protection Profiles and Security Targets |
TR 187 020 : 1.1.1
|
RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436 |
CSA ISO/IEC 15026-1 : 2015
|
SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
I.S. CWA 14355:2004
|
GUIDELINES FOR THE IMPLEMENTATION OF SECURE SIGNATURE-CREATION DEVICES |
DIN EN 419251-2:2013-06
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
GS NFV-SEC 006 : 1.1.1
|
NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS |
ISO/IEC 29167-11:2014
|
Information technology — Automatic identification and data capture techniques — Part 11: Crypto suite PRESENT-80 security services for air interface communications |
04/30040790 DC : DRAFT MARCH 2004
|
ISO/IEC DTR 15443-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 2 - ASSURANCE METHODS |
BS EN 419211-2:2013
|
Protection profiles for secure signature creation device Device with key generation |
DIN EN 419251-3 E : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
GS NFV-SEC 014 : 3.1.1
|
NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS |
DIN CEN ISO/TS 14907-1;DIN SPEC 91192:2015-12
|
ELECTRONIC FEE COLLECTION - TEST PROCEDURES FOR USER AND FIXED EQUIPMENT - PART 1: DESCRIPTION OF TEST PROCEDURES (ISO/TS 14907-1:2015) |
INCITS/ISO 19153 : 2014
|
GEOGRAPHIC INFORMATION - GEOSPATIAL DIGITAL RIGHTS MANAGEMENT REFERENCE MODEL (GEODRM RM) |
DIN EN 62601:2016-10
|
Industrial networks - Wireless communication network and communication profiles - WIA-PA (IEC 62601:2015); English version EN 62601:2016 |
15/30285708 DC : 0
|
BS EN ISO 25237 - HEALTH INFORMATICS - PSEUDONYMISATION |
DIN EN 419251-1:2013-05
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
BS ISO/IEC TR 15942:2000
|
Information technology. Programming languages. Guide for the use of the Ada programming language in high integrity systems |
BS ISO/IEC 15408-3:2008
|
Information technolgy. Security techniques. Evaluation criteria for IT security Security assurance components |
ES 202 382 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES |
ISO/IEC TR 19791:2010
|
Information technology Security techniques Security assessment of operational systems |
DIN EN 419251-2 E : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
TS 187 001 : 3.9.1
|
NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS |
SR 002 564 : 2.0.0
|
APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH |
BS IEC 62443-2-1 : 2010
|
INDUSTRIAL COMMUNICATION NETWORKS - NETWORK AND SYSTEM SECURITY - PART 2-1: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEM SECURITY PROGRAM |
CSA ISO/IEC TR 15942 : 2004 : R2014
|
INFORMATION TECHNOLOGY - PROGRAMMING LANGUAGES - GUIDE FOR THE USE OF THE ADA PROGRAMMING LANGUAGE IN HIGH INTEGRITY SYSTEMS |
PD ISO/IEC TR 20004:2015
|
Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
DIN EN 419211-6 E : 2014
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
BS EN 419251-3:2013
|
Security requirements for device for authentication Additional functionality for security targets |
07/30162799 DC : 0
|
BS ISO/IEC 15408-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE REQUIREMENTS |
07/30161079 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
ISA 99.02.01 : 2009
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS: ESTABLISHING AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS SECURITY PROGRAM |
07/30143790 DC : 0
|
BS ISO/IEC 24759 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TEST REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
10/30192143 DC : 0
|
BS ISO/IEC 29128 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - VERIFICATION OF CRYPTOGRAPHIC PROTOCOLS |
07/30107763 DC : 0
|
BS ISO/IEC 24713-2 - INFORMATION TECHNOLOGY - BIOMETRIC PROFILES FOR INTEROPERABILITY AND DATA INTERCHANGE - PART 2: PHYSICAL ACCESS CONTROL FOR EMPLOYEES AT AIRPORTS |
I.S. EN 419251-2:2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
IEC PAS 62601:2009
|
Industrial communication networks - Fieldbus specifications - WIA-PA communication network and communication profile |
CSA ISO/IEC 27003 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CSA ISO/IEC 15408-3 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE COMPONENTS |
CAN/CSA-ISO/IEC 29167-12:16
|
Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communication (Adopted ISO/IEC 29167-12:2015, first edition, 2015-05-15) |
SAE J 3061 : 2016
|
CYBERSECURITY GUIDEBOOK FOR CYBER-PHYSICAL VEHICLE SYSTEMS |
I.S. EN ISO 25237:2017
|
HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
AAMI/IEC TIR80001-2-8:2016
|
APPLICATION OF RISK MANAGEMENT FOR IT NETWORKS INCORPORATING MEDICAL DEVICES - PART 2-8: APPLICATION GUIDANCE - GUIDANCE ON STANDARDS FOR ESTABLISHING THE SECURITY CAPABILITIES IDENTIFIED IN IEC 80001-2-2 |
TR 187 011 : 2.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES |
PD CEN/TS 419221-2:2016
|
Protection Profiles for TSP cryptographic modules Cryptographic module for CSP signing operations with backup |
ISO/IEC 19792:2009
|
Information technology Security techniques Security evaluation of biometrics |
I.S. CWA 14169:2004
|
SECURE SIGNATURE-CREATION DEVICES 'EAL 4+' |
TR 102 572 : 1.1.1
|
BEST PRACTICES FOR HANDLING ELECTRONIC SIGNATURES AND SIGNED DATA FOR DIGITAL ACCOUNTING |
UNE 71510:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL1». |
IEC TR 80001-2-8:2016
|
Application of risk management for IT-networks incorporating medical devices - Part 2-8: Application guidance - Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
TS 102 165-1 : 4.2.3
|
CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
UNE EN 419211-2 : 2016
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
UNI EN ISO 27789 : 2013
|
HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS |
UNI EN 419211-6 : 2014
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
ISO/TS 25110:2013
|
Electronic fee collection Interface definition for on-board account using integrated circuit card (ICC) |
UNI EN 419212-1 : 2015
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
I.S. EN 419211-6:2014
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
PD IEC/TR 80001-2-3:2012
|
Application of risk management for IT-networks incorporating medical devices Guidance for wireless networks |
PD ISO/IEC TR 15446:2009
|
Information technology. Security techniques. Guide for the production of protection profiles and security targets |
PD IEC/TR 80001-2-8:2016
|
Application of risk management for IT-networks incorporating medical devices Application guidance. Guidance on standards for establishing the security capabilities identified in IEC TR 80001-2-2 |
TS 102 158 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION SERVICE PROVIDERS ISSUING ATTRIBUTE CERTIFICATES USABLE WITH QUALIFIED CERTIFICATES |
BS IEC 62601:2011
|
Industrial communication networks. Fieldbus specifications. WIA-PA communication network and communication profile |
08/30182164 DC : DRAFT MAY 2008
|
BS ISO 31000 - RISK MANAGEMENT - PRINCIPLES AND GUIDELINES ON IMPLEMENTATION |
I.S. EN ISO 25110:2017
|
ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) (ISO 25110:2017) |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
TS 102 181 : 1.2.1
|
EMERGENCY COMMUNICATIONS (EMTEL); REQUIREMENTS FOR COMMUNICATION BETWEEN AUTHORITIES/ORGANIZATIONS DURING EMERGENCIES |
BS ISO/IEC 29128:2011
|
Information technology. Security techniques. Verification of cryptographic protocols |
BIS IS/ISO 21188 : 2006
|
PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
PD IEC/TR 80001-2-2:2012
|
Application of risk management for IT-networks incorporating medical devices Guidance for the disclosure and communication of medical device security needs, risks and controls |
S.R. CEN/TS 419221-4:2016
|
PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 4: CRYPTOGRAPHIC MODULE FOR CSP SIGNING OPERATIONS WITHOUT BACKUP |
BS ISO/IEC 15026-1:2013
|
Systems and software engineering. Systems and software assurance Concepts and vocabulary |
BS ISO/IEC TR 14516:2002
|
Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
UNI EN 419211-2 : 2014
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
UNI EN 419251-3 : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
UNI EN 419251-1 : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
PD ISO/IEC/TR 19249:2017
|
Information technology. Security techniques Catalogue of architectural and design principles for secure products, systems and applications |
DIN EN ISO 25237:2015-10 (Draft)
|
HEALTH INFORMATICS - PSEUDONYMIZATION (ISO 25237:2017) |
17/30346588 DC : 0
|
BS EN 419221-5 - PROTECTION PROFILES FOR TRUST SERVICE PROVIDER CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
TR 187 002 : 3.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS |
09/30207165 DC : 0
|
BS EN 62601 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIA-PA COMMUNICATION NETWORK AND COMMUNICATION PROFILE |
DD CEN ISO/TS 25110:2008
|
Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
CSA ISO/IEC 15408-1 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
03/652682 DC : DRAFT NOV 2003
|
BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
CSA ISO/IEC TR 15446 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
07/30161082 DC : 0
|
BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
CSA ISO/IEC 27003 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
SR 019 020 : 1.1.2
|
THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES; STANDARDS FOR ADES DIGITAL SIGNATURES IN MOBILE AND DISTRIBUTED ENVIRONMENTS |
TS 187 016 : 3.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE) |
CR 14301 : 2002
|
HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION |
CAN/CSA-ISO/IEC 29167-14:16
|
Information technology Automatic identification and data capture techniques Part 14: Crypto suite AES OFB security services for air interface communications (Adopted ISO/IEC 29167-14:2015, first edition, 2015-10-15) |
CSA ISO/IEC 15945 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 15408-3 : 2009 : R2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 3: SECURITY ASSURANCE COMPONENTS |
16/30315782 DC : 0
|
BS ISO 16461 - INTELLIGENT TRANSPORT SYSTEMS - CRITERIA FOR PRIVACY AND INTEGRITY PROTECTION |
ES 202 383 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS |
S.R. CEN ISO/TS 17574:2017
|
ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017) |
I.S. EN IEC 62443-4-1:2018
|
SECURITY FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS - PART 4-1: SECURE PRODUCT DEVELOPMENT LIFECYCLE REQUIREMENTS |
GS ISI 001-2 : 1.1.2
|
INFORMATION SECURITY INDICATORS (ISI); INDICATORS (INC); PART 2: GUIDE TO SELECT OPERATIONAL INDICATORS BASED ON THE FULL SET GIVEN IN PART 1 |
I.S. CWA 14838-2:2003
|
FACILITATING SMART CARD TECHNOLOGY FOR ELECTRONIC TICKETING AND SEAMLESS TRAVEL - PART 2: DEVELOPMENT OF SMART CARD BASED INTEROPERABLE TICKETING SYSTEMS |
I.S. CWA 14172-1:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 1: GENERAL INTRODUCTION |
TR 187 009 : 2.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF PREVENTION OF UNSOLICITED COMMUNICATION IN THE NGN |
TR 102 512 : 1.1.1
|
TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY; SECURITY REQUIREMENTS ANALYSIS FOR MODULATION ENHANCEMENTS TO TETRA |
I.S. CWA 14890-2:2004
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
TS 102 747 : 1.1.1
|
HUMAN FACTORS (HF); PERSONALIZATION AND USER PROFILE MANAGEMENT; ARCHITECTURAL FRAMEWORK |
I.S. CWA 14365:2003
|
GUIDE ON THE USE OF ELECTRONIC SIGNATURES |
ISO/TS 25237:2008
|
Health informatics Pseudonymization |
I.S. EN 419221-5:2018
|
PROTECTION PROFILES FOR TSP CRYPTOGRAPHIC MODULES - PART 5: CRYPTOGRAPHIC MODULE FOR TRUST SERVICES |
CEN/TS 419221-2:2016
|
Protection Profiles for TSP cryptographic modules - Part 2: Cryptographic module for CSP signing operations with backup |
IEC TR 80001-2-3:2012
|
Application of risk management for IT-networks incorporating medical devices - Part 2-3: Guidance for wireless networks |
I.S. CWA 14365-2:2004
|
GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 2: PROTECTION PROFILE FOR SOFTWARE SIGNATURE CREATION DEVICES |
PREN 419212-4 : DRAFT 2016
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 4: PRIVACY SPECIFIC PROTOCOLS |
I.S. CWA 14172-6:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 6: SIGNATURE-CREATION DEVICE SUPPORTING SIGNATURES OTHER THAN QUALIFIED |
S.R. CWA 15929:2009
|
BEST PRACTICES FOR THE DESIGN AND DEVELOPMENT OF CRITICAL INFORMATION SYSTEMS |
IEC TR 80001-2-2:2012
|
Application of risk management for IT-networks incorporating medical devices - Part 2-2: Guidance for the disclosure and communication of medical device security needs, risks and controls |
I.S. CEN ISO TS 17574:2005
|
ROAD TRANSPORT AND TRAFFIC TELEMATICS - ELECTRONIC FEE COLLECTION (EFC) - GUIDELINES FOR EFC SECURITY PROTECTION PROFILES |
ANSI X9.97-1 : 2009
|
FINANCIAL SERVICES - SECURE CRYPTOGRAPHIC DEVICES (RETAIL) - PART 1: CONCEPTS, REQUIREMENTS AND EVALUATION METHODS |
IEC 62601:2015
|
Industrial networks - Wireless communication network and communication profiles - WIA-PA |
ISO/TS 14907-1:2015
|
Electronic fee collection Test procedures for user and fixed equipment Part 1: Description of test procedures |
ISO 25237:2017
|
Health informatics — Pseudonymization |
ISO/TS 14441:2013
|
Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
ISO/TS 17574:2017
|
Electronic fee collection — Guidelines for security protection profiles |
EN 419221-5:2018
|
Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services |
EN 419251-2:2013
|
Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
EN 419251-3:2013
|
Security requirements for device for authentication - Part 3: Additional functionality for security targets |
EN 419212-4:2018
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 4: Privacy specific Protocols |
EN ISO 25237:2017
|
Health informatics - Pseudonymization (ISO 25237:2017) |
EN 419251-1:2013
|
Security requirements for device for authentication - Part 1: Protection profile for core functionality |
EN 419211-6:2014
|
Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application |
EN 419211-2:2013
|
Protection profiles for secure signature creation device - Part 2: Device with key generation |
PREN 50436-6 : DRAFT 2013
|
ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
PD ISO/IEC TR 15443-3:2007
|
Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
TS 102 941 : 1.1.1
|
INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; TRUST AND PRIVACY MANAGEMENT |
08/30193508 DC : DRAFT NOV 2008
|
BS EN 61508-1 - FUNCTIONAL SAFETY OF ELECTRICAL/ELECTRONIC/PROGRAMMABLE ELECTRONIC SAFETY-RELATED SYSTEMS - PART 1: GENERAL REQUIREMENTS |
17/30351732 DC : 0
|
BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS |
ISO/IEC TR 14516:2002
|
Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
DIN EN 419211-6:2014-12
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: EXTENSION FOR DEVICE WITH KEY IMPORT AND TRUSTED CHANNEL TO SIGNATURE CREATION APPLICATION |
I.S. EN ISO 27789:2013
|
HEALTH INFORMATICS - AUDIT TRAILS FOR ELECTRONIC HEALTH RECORDS (ISO 27789:2013) |
NASA CCSDS 350.4-G : ISSUE 1
|
CCSDS GUIDE FOR SECURE SYSTEM INTERCONNECTION |
PD CEN/TS 419221-3:2016
|
Protection Profiles for TSP Cryptographic modules Cryptographic module for CSP key generation services |
BS EN ISO 25237:2017
|
Health informatics. Pseudonymization |
05/30107724 DC : DRAFT JAN 2005
|
ISO/IEC 19794-1 - BIOMETRIC DATA INTERCHANGE - PART 1: FRAMEWORK |
PD IEC TR 62210:2003
|
Power system control and associated communications. Data and communication security |
CSA ISO/IEC TR 15942:2004
|
INFORMATION TECHNOLOGY - PROGRAMMING LANGUAGES - GUIDE FOR THE USE OF THE ADA PROGRAMMING LANGUAGE IN HIGH INTEGRITY SYSTEMS |
EN 319 411-1 : 1.2.2
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY AND SECURITY REQUIREMENTS FOR TRUST SERVICE PROVIDERS ISSUING CERTIFICATES; PART 1: GENERAL REQUIREMENTS |
DD CEN ISO/TS 17574:2009
|
Electronic fee collection. Guidelines for security protection profiles |
TS 102 731 : 1.1.1
|
INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; SECURITY SERVICES AND ARCHITECTURE |
PD CEN ISO/TS 14441:2013
|
Health informatics. Security and privacy requirements of EHR systems for use in conformity assessment |
14/30285138 DC : 0
|
BS ISO/IEC 29167-14 - INFORMATION TECHNOLOGY - AUTOMATIC IDENTIFICATION AND DATA CAPTURE TECHNIQUES - PART 14: CRYPTO SUITE AES OFB SECURITY SERVICES FOR AIR INTERFACE COMMUNICATIONS |
CSA ISO/IEC 15945 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
UNE-EN 419211-6:2016
|
Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application |
PD CEN/TS 419221-4:2016
|
Protection Profiles for TSP cryptographic modules Cryptographic module for CSP signing operations without backup |
ISO/IEC 15408-1:2009
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
PD CEN ISO/TS 17574:2017
|
Electronic fee collection. Guidelines for security protection profiles |
CAN/CSA-ISO/IEC TR 14516-04 (R2017)
|
Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
UNI EN 419251-2 : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
IEC TR 62210:2003
|
Power system control and associated communications - Data and communication security |
INCITS/ISO/IEC 15292 : 2001
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - PROTECTION PROFILE REGISTRATION PROCEDURES |
ARINC 664-5 : 2005
|
AIRCRAFT DATA NETWORK - PART 5: NETWORK DOMAIN CHARACTERISTICS AND INTERCONNECTION |
INCITS/ISO/IEC 19792 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY EVALUATION OF BIOMETRICS |
INCITS/ISO/IEC 15945 : 2002 : R2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
TR 187 014 : 2.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); ESECURITY; USER GUIDE TO ETVRA WEB-DATABASE |
IEEE/ISO/IEC 15026-1-2014
|
IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
S.R. CEN ISO/TS 25110:2013
|
ELECTRONIC FEE COLLECTION - INTERFACE DEFINITION FOR ON-BOARD ACCOUNT USING INTEGRATED CIRCUIT CARD (ICC) (ISO/TS 25110:2013) |
I.S. EN 419211-2:2013
|
PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION |
ISO/IEC 15292:2001
|
Information technology - Security techniques - Protection Profile registration procedures |
IEEE 1074-2006
|
IEEE Standard for Developing a Software Project Life Cycle Process |
I.S. EN 419251-3:2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
I.S. EN CWA 14172-5:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 5: SECURE SIGNATURE CREATION DEVICES |
I.S. EN 419251-1:2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
17/30357420 DC : 0
|
BS EN 419241-2 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 2: PROTECTION PROFILE FOR QSCD FOR SERVER SIGNING |
TS 102 556 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE |
CSA ISO/IEC TR 15942:04 (R2019)
|
Information Technology - Programming Languages - Guide for the Use of the Ada Programming Language in High Integrity Systems (Adopted ISO/IEC TR 15942:2000, first edition, 2000-03-01) |
BS EN ISO 25110:2017
|
Electronic fee collection. Interface definition for on-board account using integrated circuit card (ICC) |
ISO 25110:2017
|
Electronic fee collection — Interface definition for on-board account using integrated circuit card (ICC) |
I.S. CR 14301:2002
|
HEALTH INFORMATICS - FRAMEWORK FOR SECURITY PROTECTION OF HEALTHCARE COMMUNICATION |
I.S. CWA 14172-4:2004
|
EESSI CONFORMITY ASSESSMENT GUIDANCE - PART 4: SIGNATURE CREATION APPLICATIONS AND GENERAL GUIDELINES FOR ELECTRONIC SIGNATURE VERIFICATION |
ISO 27789:2013
|
Health informatics Audit trails for electronic health records |
EN ISO 27789:2013
|
Health informatics - Audit trails for electronic health records (ISO 27789:2013) |
CEN/TS 419221-4:2016
|
Protection Profiles for TSP cryptographic modules - Part 4: Cryptographic module for CSP signing operations without backup |
CEN/TS 419221-3:2016
|
Protection Profiles for TSP Cryptographic modules - Part 3: Cryptographic module for CSP key generation services |
CEN ISO/TS 14907-1:2015
|
Electronic fee collection - Test procedures for user and fixed equipment - Part 1: Description of test procedures (ISO/TS 14907-1:2015) |