• TS 103 532 : 1.1.1

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL

    Available format(s): 

    Superseded date:  02-06-2021

    Language(s): 

    Published date:  02-04-2018

    Publisher:  European Telecommunications Standards Institute

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    Modal verbs terminology
    1 Scope
    2 References
    3 Definitions and abbreviations
    4 Attribute-Based Encryption Toolkit
    5 Trust models
    6 Procedures for distributing attributes and keys
    7 Attribute Based Access Control layer
    Annex A (informative) - ABE schemes from the cryptographic
            literature
    Annex B (informative) - Applicable features of traditional ABAC
    Annex C (informative) - Common semantics
    Annex D (normative) - Grammars for the attribute based access
            control layer
    Annex E (informative) - Bibliography
    History

    Abstract - (Show below) - (Hide below)

    Defines trust models, functions and protocols using attribute based encryption as a foundation of an attribute based access control scheme.

    General Product Information - (Show below) - (Hide below)

    Committee CYBER
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 24760-1:2011 Information technology Security techniques A framework for identity management Part 1: Terminology and concepts
    FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
    ISO 8601:2004 Data elements and interchange formats Information interchange Representation of dates and times
    TS 118 112 : 2.0.0 ONEM2M; BASE ONTOLOGY (ONEM2M TS-0012 VERSION 2.0.0 RELEASE 2)
    ISO/IEC 19944:2017 Information technology Cloud computing Cloud services and devices: Data flow, data categories and data use
    IEEE 754-2008 REDLINE IEEE Standard for Floating-Point Arithmetic
    ISO/IEC 17789:2014 Information technology — Cloud computing — Reference architecture
    TR 187 010 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; REPORT ON ISSUES RELATED TO SECURITY IN IDENTITY MANAGEMENT AND THEIR RESOLUTION IN THE NGN
    ISO/IEC 17788:2014 Information technology — Cloud computing — Overview and vocabulary
    ISO/IEC 29100:2011 Information technology — Security techniques — Privacy framework
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective