• There are no items in your cart

TR 103 304 : 1.1.1

Current

Current

The latest, up-to-date edition.

CYBER; PERSONALLY IDENTIFIABLE INFORMATION (PII) PROTECTION IN MOBILE AND CLOUD SERVICES

Published date

16-08-2016

Sorry this product is not available in your region.

Intellectual Property Rights
Foreword
Modal verbs terminology
Executive summary
1 Scope
2 References
3 Definitions and abbreviations
4 Overview
5 Threats to PII
6 Technical aspects
7 Use cases, actors and roles
Annex A - Scenarios
History

Provides a number of scenarios focusing on today's ICT and develops an analysis of possible threats to Personally Identifiable Information (PII) in mobile and cloud based services.

Committee
CYBER
DocumentType
Standard
PublisherName
European Telecommunications Standards Institute
Status
Current

ISO/IEC 11889-1:2015 Information technology — Trusted platform module library — Part 1: Architecture
TS 119 612 : 2.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TRUSTED LISTS
ISO/IEC 11889-2:2015 Information technology — Trusted Platform Module Library — Part 2: Structures
ISO/IEC 11889-3:2015 Information technology — Trusted Platform Module Library — Part 3: Commands
ISO/IEC 29191:2012 Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.
ISO/IEC 29115:2013 Information technology — Security techniques — Entity authentication assurance framework
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
TR 101 567 : 1.1.1 LAWFUL INTERCEPTION (LI); CLOUD/VIRTUAL SERVICES FOR LAWFUL INTERCEPTION (LI) AND RETAINED DATA (RD)
TS 101 331 : 1.4.1 LAWFUL INTERCEPTION (LI); REQUIREMENTS OF LAW ENFORCEMENT AGENCIES
119999/5/EC : 1999 DIRECTIVE 1999/5/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL OF 9 MARCH 1999 ON RADIO EQUIPMENT AND TELECOMMUNICATIONS TERMINAL EQUIPMENT AND THE MUTUAL RECOGNITION OF THEIR CONFORMITY
ISO/IEC 27040:2015 Information technology — Security techniques — Storage security
TR 103 308 : 1.1.1 CYBER; SECURITY BASELINE REGARDING LI AND RD FOR NFV AND RELATED PLATFORMS
TS 101 671 : 3.14.1 LAWFUL INTERCEPTION (LI); HANDOVER INTERFACE FOR THE LAWFUL INTERCEPTION OF TELECOMMUNICATIONS TRAFFIC
ISO/IEC 17789:2014 Information technology — Cloud computing — Reference architecture
ISO/IEC 11889-4:2015 Information technology Trusted Platform Module Library Part 4: Supporting Routines
TR 187 010 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; REPORT ON ISSUES RELATED TO SECURITY IN IDENTITY MANAGEMENT AND THEIR RESOLUTION IN THE NGN
ISO/IEC 29100:2011 Information technology — Security techniques — Privacy framework

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.