TS 103 532 : 1.1.1
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL
02-06-2021
02-04-2018
Intellectual Property Rights
Foreword
Modal verbs terminology
1 Scope
2 References
3 Definitions and abbreviations
4 Attribute-Based Encryption Toolkit
5 Trust models
6 Procedures for distributing attributes and keys
7 Attribute Based Access Control layer
Annex A (informative) - ABE schemes from the cryptographic
literature
Annex B (informative) - Applicable features of traditional ABAC
Annex C (informative) - Common semantics
Annex D (normative) - Grammars for the attribute based access
control layer
Annex E (informative) - Bibliography
History
Defines trust models, functions and protocols using attribute based encryption as a foundation of an attribute based access control scheme.
Committee |
CYBER
|
DocumentType |
Standard
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Superseded
|
SupersededBy |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 24760-1:2011 | Information technology Security techniques A framework for identity management Part 1: Terminology and concepts |
FIPS PUB 197 : 2001 | ADVANCED ENCRYPTION STANDARD (AES) |
ISO 8601:2004 | Data elements and interchange formats Information interchange Representation of dates and times |
TS 118 112 : 2.0.0 | ONEM2M; BASE ONTOLOGY (ONEM2M TS-0012 VERSION 2.0.0 RELEASE 2) |
ISO/IEC 19944:2017 | Information technology Cloud computing Cloud services and devices: Data flow, data categories and data use |
IEEE 754-2008 REDLINE | IEEE Standard for Floating-Point Arithmetic |
ISO/IEC 17789:2014 | Information technology — Cloud computing — Reference architecture |
TR 187 010 : 2.1.1 | TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; REPORT ON ISSUES RELATED TO SECURITY IN IDENTITY MANAGEMENT AND THEIR RESOLUTION IN THE NGN |
ISO/IEC 17788:2014 | Information technology — Cloud computing — Overview and vocabulary |
ISO/IEC 29100:2011 | Information technology — Security techniques — Privacy framework |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.