ISO/IEC 24760-1:2011
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology Security techniques A framework for identity management Part 1: Terminology and concepts
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
21-06-2019
English
07-12-2011
ISO/IEC 24760-1:2011
- defines terms for identity management, and
- specifies core concepts of identity and identity management and their relationships.
It is applicable to any information system that processes identity information.
A bibliography of documents describing various aspects of identity information management is provided.
DocumentType |
Standard
|
Pages |
0
|
ProductNote |
THIS STANDARD ALSO RFERS TO ITU Y.2720
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy |
Standards | Relationship |
DS ISO/IEC 24760-1 : 2012 | Identical |
BS ISO/IEC 24760-1:2011 | Identical |
NEN ISO/IEC 24760-1 : 2012 | Identical |
BS ISO/IEC 27037 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION, AND PRESERVATION OF DIGITAL EVIDENCE |
14/30255584 DC : 0 | BS ISO 5127 - INFORMATION AND DOCUMENTATION - FOUNDATION AND VOCABULARY |
TS 103 532 : 1.1.1 | CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL |
17/30277512 DC : 0 | BS ISO/IEC 29003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IDENTITY PROOFING |
BS EN ISO/IEC 27037:2016 | Information technology. Security techniques. Guidelines for identification, collection, acquisition and preservation of digital evidence |
INCITS/ISO/IEC 27037 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE |
INCITS/ISO/IEC 29115 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION ASSURANCE FRAMEWORK |
BS ISO/IEC 29115:2013 | Information technology. Security techniques. Entity authentication assurance framework |
BS ISO/IEC 29146:2016 | Information technology. Security techniques. A framework for access management |
15/30192160 DC : 0 | BS ISO/IEC 29146 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR ACCESS MANAGEMENT |
ISO/IEC 19286:2018 | Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services |
ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management |
BS ISO/IEC 24745:2011 | Information technology. Security techniques. Biometric information protection |
TS 118 111 : 2.4.1 | ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2) |
BS ISO/IEC 19286:2018 | Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services |
ISO 5127:2017 | Information and documentation Foundation and vocabulary |
ISO/IEC 27037:2012 | Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence |
ISO/IEC 24760-3:2016 | Information technology — Security techniques — A framework for identity management — Part 3: Practice |
SR 019 020 : 1.1.2 | THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES; STANDARDS FOR ADES DIGITAL SIGNATURES IN MOBILE AND DISTRIBUTED ENVIRONMENTS |
ISO/IEC 24760-2:2015 | Information technology — Security techniques — A framework for identity management — Part 2: Reference architecture and requirements |
SR 003 391 : 2.1.1 | CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
I.S. EN ISO/IEC 27037:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR IDENTIFICATION, COLLECTION, ACQUISITION AND PRESERVATION OF DIGITAL EVIDENCE (ISO/IEC 27037:2012) |
ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
ISO 17523:2016 | Health informatics — Requirements for electronic prescriptions |
EN ISO 17523:2016 | Health informatics - Requirements for electronic prescriptions (ISO 17523:2016) |
EN ISO/IEC 27037:2016 | Information technology - Security techniques - Guidelines for identification, collection, acquisition and preservation of digital evidence (ISO/IEC 27037:2012) |
INCITS/ISO/IEC 24745 : 2012(R2017) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
BS ISO 5127:2017 | Information and documentation. Foundation and vocabulary |
ISO/IEC TR 30117:2014 | Information technology Guide to on-card biometric comparison standards and applications |
BS EN ISO 17523:2016 | Health informatics. Requirements for electronic prescriptions |
I.S. EN ISO 17523:2016 | HEALTH INFORMATICS - REQUIREMENTS FOR ELECTRONIC PRESCRIPTIONS (ISO 17523:2016) |
ISO/IEC 24745:2011 | Information technology Security techniques Biometric information protection |
CAN/CSA-ISO/IEC 24760-3:18 | Information technology — Security techniques — A framework for identity management — Part 3: Practice (Adopted ISO/IEC 24760-3:2016, first edition, 2016-08-01) |
INCITS/ISO/IEC 29115:2013[R2019] | Information technology - Security techniques - Entity authentication assurance framework |
ISO/IEC 29146:2016 | Information technology — Security techniques — A framework for access management |
ISO 19092:2008 | Financial services — Biometrics — Security framework |
ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO/IEC 29101:2013 | Information technology Security techniques Privacy architecture framework |
ISO 9001:2015 | Quality management systems — Requirements |
ISO/IEC TR 27008:2011 | Information technology Security techniques Guidelines for auditors on information security controls |
ISO/IEC 9594-2:2017 | Information technology Open Systems Interconnection The Directory Part 2: Models |
ISO/IEC 27007:2017 | Information technology Security techniques Guidelines for information security management systems auditing |
ANSI INCITS 359 : 2012 | INFORMATION TECHNOLOGY - ROLE BASED ACCESS CONTROL |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.