S.R. CEN/TS 16439:2013
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK
Hardcopy , PDF
English
01-01-2013
02-11-2015
Foreword
0 Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 Trust model
6 Security requirements
7 Security measures - countermeasures
8 Security specifications for interoperable interface
implementation
9 Key management
Annex A (normative) - Data type specification
Annex B (normative) - Implementation Conformance
Statement (ICS) proforma
Annex C (informative) - Stakeholder objectives and
generic requirements
Annex D (informative) - Threat analysis
Annex E (informative) - Security Policies
Annex F (informative) - Example for an EETS Security
Policy
Annex G (informative) - Requirements on privacy-focused
implementation
Bibliography
Specifies the roles and functions as well as the internal and external entities of the EFC system environment.
| DocumentType |
Standard
|
| Pages |
144
|
| PublisherName |
National Standards Authority of Ireland
|
| Status |
Superseded
|
| SupersededBy |
| Standards | Relationship |
| CEN/TS 16439:2013 | Identical |
| ISO/IEC 18031:2011 | Information technology — Security techniques — Random bit generation |
| ISO 12855:2015 | Electronic fee collection — Information exchange between service provision and toll charging |
| ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
| ISO/IEC 8825-2:2015 | Information technology — ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) — Part 2: |
| ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
| ISO/IEC 27003:2017 | Information technology — Security techniques — Information security management systems — Guidance |
| EN 15509:2014 | Electronic fee collection - Interoperability application profile for DSRC |
| ISO/IEC 8825-1:2015 | Information technology — ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) — Part 1: |
| ISO 17573:2010 | Electronic fee collection — Systems architecture for vehicle-related tolling |
| ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
| ISO/IEC 8825-4:2015 | Information technology — ASN.1 encoding rules: XML Encoding Rules (XER) — Part 4: |
| ISO/IEC 18033-3:2010 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers |
| ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
| ISO/TS 17574:2017 | Electronic fee collection — Guidelines for security protection profiles |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| EN ISO 12855:2015 | Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015) |
| ISO/TS 14907-2:2016 | Electronic fee collection — Test procedures for user and fixed equipment — Part 2: Conformance test for the on-board unit application interface |
| ISO/IEC 10181-1:1996 | Information technology — Open Systems Interconnection — Security frameworks for open systems: Overview |
| ISO/TS 17575-1:2010 | Electronic fee collection — Application interface definition for autonomous systems — Part 1: Charging |
| ISO/IEC 9594-8:2017 | Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks |
| ISO 14906:2011 | Electronic fee collection — Application interface definition for dedicated short-range communication |
| ISO 7498-2:1989 | Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture |
| ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
| ISO/IEC 27005:2011 | Information technology — Security techniques — Information security risk management |
| CEN ISO/TS 14907-2:2016 | Electronic fee collection - Test procedures for user and fixed equipment - Part 2: Conformance test for the on-board unit application interface (ISO/TS 14907-2:2016) |
| ISO/TS 13141:2010 | Electronic fee collection — Localisation augmentation communication for autonomous systems |
| CEN ISO/TS 17574:2017 | Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017) |
| ISO/IEC 9797-1:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher |
| ISO/IEC 10118-3:2004 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions |
| ISO/TS 12813:2009 | Electronic fee collection — Compliance check communication for autonomous systems |
| ISO/IEC 27000:2016 | Information technology — Security techniques — Information security management systems — Overview and vocabulary |
| ISO/IEC 14888-2:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms |
| ISO/IEC 11770-1:2010 | Information technology — Security techniques — Key management — Part 1: Framework |
| CEN ISO/TS 12813:2009 | Electronic fee collection - Compliance check communication for autonomous systems (ISO/TS 12813:2009) |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.