ISO/IEC 18014-2:2009
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology Security techniques Time-stamping services Part 2: Mechanisms producing independent tokens
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
09-09-2021
English
14-12-2009
ISO/IEC 18014-2:2009 presents a general framework for the provision of time-stamping services.
Time-stamping services may generate, renew and verify time-stamp tokens.
Time-stamp tokens are associations between data and points in time, and are created in a way that aims to provide evidence that the data existed at the associated date and time. In addition, the evidence may be used by non-repudiation services.
ISO/IEC 18014-2:2004 specifies mechanisms that generate independent time-stamps: in order to verify an independent time-stamp token, verifiers do not need access to any other time-stamp tokens. That is, time-stamp tokens are not linked, as is the case for the token types defined in ISO/IEC 18014-3.
DocumentType |
Standard
|
Pages |
28
|
ProductNote |
THIS STANDARD IS ALSO REFERSE TO RFC 3161, RFC 3280,RFC 3852,
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
Standards | Relationship |
INCITS/ISO/IEC 18014-2:2009(R2020) | Identical |
CSA ISO/IEC 18014-2:10 (R2020) | Identical |
INCITS/ISO/IEC 18014-2 : 2010 | Identical |
BS ISO/IEC 18014-2:2009 | Identical |
NEN ISO/IEC 18014-2 : 2010 | Identical |
DS ISO/IEC 18014-2 : 2010 | Identical |
CSA ISO/IEC 18014-2 : 2010 : R2015 | Identical |
CSA ISO/IEC 18014-2 : 2010 | Identical |
PN ISO/IEC 18014-2 : 2005 | Identical |
08/30169511 DC : DRAFT DEC 2008 | BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
BS ISO 17090-4:2014 | Health informatics. Public key infrastructure Digital Signatures for healthcare documents |
14/30266753 DC : 0 | BS ISO 17090-4 - HEALTH INFORMATICS - PUBLIC KEY INFRASTRUCTURE - PART 4: DIGITAL SIGNATURES FOR HEALTHCARE DOCUMENTS |
ISO 14533-3:2017 | Processes, data elements and documents in commerce, industry and administration — Long term signature profiles — Part 3: Long term signature profiles for PDF Advanced Electronic Signatures (PAdES) |
ISO 14533-1:2014 | Processes, data elements and documents in commerce, industry and administration Long term signature profiles Part 1: Long term signature profiles for CMS Advanced Electronic Signatures (CAdES) |
08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
ISO/IEC 15026-1:2013 | Systems and software engineering Systems and software assurance Part 1: Concepts and vocabulary |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
CSA ISO/IEC 15026-1 : 2015 | SYSTEMS AND SOFTWARE ENGINEERING - SYSTEMS AND SOFTWARE ASSURANCE - PART 1: CONCEPTS AND VOCABULARY |
17/30281253 DC : 0 | BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
ISO 14533-2:2012 | Processes, data elements and documents in commerce, industry and administration Long term signature profiles Part 2: Long term signature profiles for XML Advanced Electronic Signatures (XAdES) |
BS ISO 14533-3:2017 | Processes, data elements and documents in commerce, industry and administration. Long term signature profiles Long term signature profiles for PDF Advanced Electronic Signatures (PAdES) |
DIN ISO 14533-2:2015-05 | PROCESSES, DATA ELEMENTS AND DOCUMENTS IN COMMERCE, INDUSTRY AND ADMINISTRATION - LONG TERM SIGNATURE PROFILES - PART 2: LONG TERM SIGNATURE PROFILES FOR XML ADVANCED ELECTRONIC SIGNATURES (XADES) (ISO 14533-2:2012) |
16/30330545 DC : 0 | BS ISO 14533-3 - PROCESSES, DATA ELEMENTS AND DOCUMENTS IN COMMERCE, INDUSTRY AND ADMINISTRATION - LONG TERM SIGNATURE PROFILES - PART 3: LONG TERM SIGNATURE PROFILES FOR PDF ADVANCED ELECTRONIC SIGNATURES (PADES) |
SR 002 298 : 1.1.1 | RESPONSE FROM CEN AND ETSI TO THE "COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS: NETWORK AND INFORMATION SECURITY: PROPOSAL FOR A EUROPEAN POLICY APPROACH" |
BIS IS/ISO 21188 : 2006 | PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
05/30092187 DC : DRAFT APR 2005 | ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
BS ISO 21188:2006 | Public key infrastructure for financial services. Practices and policy framework |
DD IEC/TS 62351-2:2008 | Power systems management and associated information exchange. Data and communications security Glossary of terms |
ISO 17090-4:2014 | Health informatics Public key infrastructure Part 4: Digital Signatures for healthcare documents |
DIN ISO 14533-1:2015-05 | PROCESSES, DATA ELEMENTS AND DOCUMENTS IN COMMERCE, INDUSTRY AND ADMINISTRATION - LONG TERM SIGNATURE PROFILES - PART 1: LONG TERM SIGNATURE PROFILES FOR CMS ADVANCED ELECTRONIC SIGNATURES (CADES) (ISO 14533-1:2014) |
BS ISO/IEC 15026-1:2013 | Systems and software engineering. Systems and software assurance Concepts and vocabulary |
PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
ISO 21188:2018 | Public key infrastructure for financial services — Practices and policy framework |
IEEE/ISO/IEC 15026-1-2014 | IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary |
ISO/IEC TR 29149:2012 | Information technology Security techniques Best practices for the provision and use of time-stamping services |
ISO/IEC 18014-3:2009 | Information technology Security techniques Time-stamping services Part 3: Mechanisms producing linked tokens |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 8824-2:2015 | Information technology Abstract Syntax Notation One (ASN.1): Information object specification Part 2: |
ISO/IEC 10181-1:1996 | Information technology Open Systems Interconnection Security frameworks for open systems: Overview |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
ISO/IEC 8824-4:2015 | Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Part 4: |
ISO/IEC 8824-1:2015 | Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1: |
ISO/IEC 8824-3:2015 | Information technology Abstract Syntax Notation One (ASN.1): Constraint specification Part 3: |
ISO/IEC 18014-1:2008 | Information technology Security techniques Time-stamping services Part 1: Framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.