PREN 50159 : DRAFT 2009
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS
01-09-2010
12-01-2013
Foreword
Introduction
1 Scope
2 Normative references
3 Definitions
4 Reference architecture
5 Threats to the transmission system
6 Classification of transmission systems
6.1 Scope/purpose
6.2 General aspects of classification
6.3 Criteria for the classification of transmission
systems
6.4 Relationship between transmission systems and the
threats
7 Requirements for defences
7.1 Introduction
7.2 General requirements
7.3 Specific defences
7.4 Applicability of defences
Annex A (informative) - Threats on open transmission systems
Annex B (informative) - Categories of transmission systems
Annex C (informative) - Guideline for defences
Annex D (informative) - Guidelines for use of the standard
Annex E (informative) - Mapping from previous standards
Annex ZZ (informative) - Coverage of Essential Requirements
of EC Directives
Bibliography
Provides the basic requirements needed to achieve safety-related communication between safety-related equipment connected to the transmission system.
Committee |
TC 9X
|
DocumentType |
Draft
|
PublisherName |
European Committee for Standards - Electrical
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
VDE 0831-159 : 2011-04 | Identical |
09/30202174 DC : 0 | Identical |
NF EN 50159 : 2011 | Identical |
DIN EN 50159 : 2011 | Identical |
VDE 0831-100 : DRAFT 1994 | Identical |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 10118-4:1998 | Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 9979:1999 | Information technology Security techniques Procedures for the registration of cryptographic algorithms |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
EN 50129 : 2003 COR 2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED ELECTRONIC SYSTEMS FOR SIGNALLING |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
EN 50126 : 1999 | RAILWAY APPLICATIONS - THE SPECIFICATION AND DEMONSTRATION OF RELIABILITY, AVAILABILITY, MAINTAINABILITY AND SAFETY (RAMS) |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.