TR 103 304 : 1.1.1
Current
The latest, up-to-date edition.
CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES
16-08-2016
Intellectual Property Rights
Foreword
Modal verbs terminology
Executive summary
1 Scope
2 References
3 Definitions and abbreviations
4 Overview
5 Threats to PII
6 Technical aspects
7 Use cases, actors and roles
Annex A - Scenarios
History
Provides a number of scenarios focusing on today's ICT and develops an analysis of possible threats to Personally Identifiable Information (PII) in mobile and cloud based services.
Committee |
CYBER
|
DocumentType |
Standard
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
ISO/IEC 11889-1:2015 | Information technology — Trusted platform module library — Part 1: Architecture |
TS 119 612 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TRUSTED LISTS |
ISO/IEC 11889-2:2015 | Information technology — Trusted Platform Module Library — Part 2: Structures |
ISO/IEC 11889-3:2015 | Information technology — Trusted Platform Module Library — Part 3: Commands |
ISO/IEC 29191:2012 | Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication. |
ISO/IEC 29115:2013 | Information technology — Security techniques — Entity authentication assurance framework |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
TR 101 567 : 1.1.1 | LAWFUL INTERCEPTION (LI); CLOUD/VIRTUAL SERVICES FOR LAWFUL INTERCEPTION (LI) AND RETAINED DATA (RD) |
TS 101 331 : 1.4.1 | LAWFUL INTERCEPTION (LI); REQUIREMENTS OF LAW ENFORCEMENT AGENCIES |
119999/5/EC : 1999 | DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 9 MARCH 1999 ON RADIO EQUIPMENT AND TELECOMMUNICATIONS TERMINAL EQUIPMENT AND THE MUTUAL RECOGNITION OF THEIR CONFORMITY |
ISO/IEC 27040:2015 | Information technology — Security techniques — Storage security |
TR 103 308 : 1.1.1 | CYBER; SECURITY BASELINE REGARDING LI AND RD FOR NFV AND RELATED PLATFORMS |
TS 101 671 : 3.14.1 | LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC |
ISO/IEC 17789:2014 | Information technology — Cloud computing — Reference architecture |
ISO/IEC 11889-4:2015 | Information technology — Trusted Platform Module Library — Part 4: Supporting Routines |
TR 187 010 : 2.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; REPORT ON ISSUES RELATED TO SECURITY IN IDENTITY MANAGEMENT AND THEIR RESOLUTION IN THE NGN |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.