ISO/IEC 18014-2:2009
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens
Hardcopy , PDF
English
14-12-2009
09-04-2025
ISO/IEC 18014-2:2009 presents a general framework for the provision of time-stamping services.
Time-stamping services may generate, renew and verify time-stamp tokens.
Time-stamp tokens are associations between data and points in time, and are created in a way that aims to provide evidence that the data existed at the associated date and time. In addition, the evidence may be used by non-repudiation services.
ISO/IEC 18014-2:2004 specifies mechanisms that generate independent time-stamps: in order to verify an independent time-stamp token, verifiers do not need access to any other time-stamp tokens. That is, time-stamp tokens are not linked, as is the case for the token types defined in ISO/IEC 18014-3.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
28
|
| ProductNote |
THIS STANDARD IS ALSO REFERSE TO RFC 3161, RFC 3280,RFC 3852,
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| Supersedes |
| Standards | Relationship |
| INCITS/ISO/IEC 18014-2:2009(R2020) | Identical |
| INCITS/ISO/IEC 18014-2 : 2010 | Identical |
| BS ISO/IEC 18014-2:2009 | Identical |
| NEN ISO/IEC 18014-2 : 2010 | Identical |
| DS ISO/IEC 18014-2 : 2010 | Identical |
| PN ISO/IEC 18014-2 : 2005 | Identical |
| 08/30169511 DC : DRAFT DEC 2008 | BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| BS ISO 17090-4:2014 | Health informatics. Public key infrastructure Digital Signatures for healthcare documents |
| 14/30266753 DC : 0 | BS ISO 17090-4 - HEALTH INFORMATICS - PUBLIC KEY INFRASTRUCTURE - PART 4: DIGITAL SIGNATURES FOR HEALTHCARE DOCUMENTS |
| ISO 14533-3:2017 | Processes, data elements and documents in commerce, industry and administration — Long term signature profiles — Part 3: Long term signature profiles for PDF Advanced Electronic Signatures (PAdES) |
| ISO 14533-1:2014 | Processes, data elements and documents in commerce, industry and administration — Long term signature profiles — Part 1: Long term signature profiles for CMS Advanced Electronic Signatures (CAdES) |
| 08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
| ISO/IEC 15026-1:2013 | Systems and software engineering — Systems and software assurance — Part 1: Concepts and vocabulary |
| IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
| 17/30281253 DC : 0 | BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
| ISO 14533-2:2012 | Processes, data elements and documents in commerce, industry and administration — Long term signature profiles — Part 2: Long term signature profiles for XML Advanced Electronic Signatures (XAdES) |
| BS ISO 14533-3:2017 | Processes, data elements and documents in commerce, industry and administration. Long term signature profiles Long term signature profiles for PDF Advanced Electronic Signatures (PAdES) |
| DIN ISO 14533-2:2015-05 | Processes, data elements and documents in commerce, industry and administration - Long term signature profiles - Part 2: Long term signature profiles for XML Advanced Electronic Signatures (XAdES) (ISO 14533-2:2012) |
| 16/30330545 DC : 0 | BS ISO 14533-3 - PROCESSES, DATA ELEMENTS AND DOCUMENTS IN COMMERCE, INDUSTRY AND ADMINISTRATION - LONG TERM SIGNATURE PROFILES - PART 3: LONG TERM SIGNATURE PROFILES FOR PDF ADVANCED ELECTRONIC SIGNATURES (PADES) |
| BIS IS/ISO 21188 : 2006 | PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
| 05/30092187 DC : DRAFT APR 2005 | ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
| BS ISO 21188:2006 | Public key infrastructure for financial services. Practices and policy framework |
| DD IEC/TS 62351-2:2008 | Power systems management and associated information exchange. Data and communications security Glossary of terms |
| ISO 17090-4:2014 | Health informatics — Public key infrastructure — Part 4: Digital Signatures for healthcare documents |
| DIN ISO 14533-1:2015-05 | Processes, data elements and documents in commerce, industry and administration - Long term signature profiles - Part 1: Long term signature profiles for CMS Advanced Electronic Signatures (CAdES) (ISO 14533-1:2014) |
| BS ISO/IEC 15026-1:2013 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
| PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
| ISO 21188:2018 | Public key infrastructure for financial services — Practices and policy framework |
| IEEE/ISO/IEC 15026-1-2014 | IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
| ISO/IEC TR 29149:2012 | Information technology — Security techniques — Best practices for the provision and use of time-stamping services |
| ISO/IEC 18014-3:2009 | Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens |
| ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services |
| ISO/IEC 8825-1:2015 | Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) — Part 1: |
| ISO/IEC 8824-2:2015 | Information technology — Abstract Syntax Notation One (ASN.1): Information object specification — Part 2: |
| ISO/IEC 10181-1:1996 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Overview |
| ISO/IEC 9594-8:2017 | Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks |
| ISO 7498-2:1989 | Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture |
| ISO/IEC 8824-4:2015 | Information technology — Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications — Part 4: |
| ISO/IEC 8824-1:2015 | Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic notation — Part 1: |
| ISO/IEC 8824-3:2015 | Information technology — Abstract Syntax Notation One (ASN.1): Constraint specification — Part 3: |
| ISO/IEC 18014-1:2008 | Information technology — Security techniques — Time-stamping services — Part 1: Framework |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.