ISO/IEC TR 29149:2012
Current
Current
The latest, up-to-date edition.
Information technology — Security techniques — Best practices for the provision and use of time-stamping services
Available format(s)
Hardcopy , PDF
Language(s)
English
Published date
05-03-2012
€127.00
Excluding VAT
ISO/IEC TR 29149:2012 explains how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms. It defines:
- how time-stamp requesters should use time-stamp token generation services;
- how TSAs (time-stamping authorities) should provide a service of guaranteed quality;
- how TSAs should deserve trust based on good practices;
- which algorithms and parameters should be used in TST (time-stamp token) generation and TST renewal, so that TSTs resist during the time period during which the TSTs can be verified as being valid;
- how time-stamp verifiers should use the time-stamp token verification services, both when validating individual TSTs, and when validating sequences of renewal TSTs.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
21
|
| ProductNote |
THIS STANDARD ALSO REFERS TO [RFC 2104] HMAC,[RFC 3161] Internet X.509,RFC 3275] ,[RFC 3628],[RFC 4490],[RFC 4491] ,[RFC 5126],[RFC 5280],[RFC 5652],[SP 800-92],[SP 800-102]
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Standards | Relationship |
| PD ISO/IEC TR 29149:2012 | Identical |
| NEN NPR ISO/IEC TR 29149 : 2012 | Identical |
| ANSI X9.95 : 2016 | FINANCIAL SERVICES - TRUSTED TIME STAMP MANAGEMENT AND SECURITY |
| ISO/IEC 18014-3:2009 | Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens |
| ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
| ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
| ISO/IEC 18014-2:2009 | Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens |
| ISO/IEC 10181-3:1996 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Access control framework |
| ISO/IEC 9594-8:2017 | Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks |
| GOST R 34-11 : 2012 | INFORMATION TECHNOLOGY - CRYPTOGRAPHIC DATA SECURITY - HASH FUNCTION |
| ISO 7498-2:1989 | Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture |
| ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
| ISO/IEC 10118-1:2016 | Information technology — Security techniques — Hash-functions — Part 1: General |
| ISO/IEC 10181-4:1997 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Non-repudiation framework — Part 4: |
| ISO/IEC 9796-2:2010 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms |
| FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
| ISO/IEC 9797-1:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher |
| ISO/IEC 10118-3:2004 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions |
| ISO/IEC 8824-1:2015 | Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic notation — Part 1: |
| ISO/IEC 9797-2:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function |
| ISO/IEC 11770-1:2010 | Information technology — Security techniques — Key management — Part 1: Framework |
| FIPS PUB 180 : 2002 | SECURE HASH STANDARD |
| ISO/IEC 18014-1:2008 | Information technology — Security techniques — Time-stamping services — Part 1: Framework |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
| ISO/IEC 9798-1:2010 | Information technology — Security techniques — Entity authentication — Part 1: General |
Summarise
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.