ISO/IEC 9594-8:2020

مواصفة قياسية دولية   الإصدار الحالي · اعتمدت بتاريخ ٠١ ديسمبر ٢٠٢٠

Information technology — Open systems interconnection — Part 8: The Directory: Public-key and attribute certificate frameworks

ملفات الوثيقة ISO/IEC 9594-8:2020

الإنجليزية 224 صفحات
الإصدار الحالي
102.33 OMR

مجال الوثيقة ISO/IEC 9594-8:2020

This document addresses some of the security requirements in the areas of authentication and other security services through the provision of a set of frameworks upon which full services can be based. Specifically, this Recommendation | International Standard defines frameworks for:

? public-key certificates; and

? attribute certificates.

The public-key certificate framework defined in this Recommendation | International Standard specifies the information objects and data types for a public-key infrastructure (PKI), including public-key certificates, certificate revocation lists (CRLs), trust broker and authorization and validation lists (AVLs). The attribute certificate framework specifies the information objects and data types for a privilege management infrastructure (PMI), including attribute certificates, and attribute certificate revocation lists (ACRLs). This Recommendation | International Standard also provides the framework for issuing, managing, using and revoking certificates. An extensibility mechanism is included in the defined formats for both certificate types and for all revocation list schemes. This Recommendation | International Standard also includes a set of extensions, which is expected to be generally useful across a number of applications of PKI and PMI. The schema components (including object classes, attribute types and matching rules) for storing PKI and PMI information in a directory, are included in this Recommendation | International Standard.

This Recommendation | International Standard specifies the framework for strong authentication, involving credentials formed using cryptographic techniques. It is not intended to establish this as a general framework for authentication, but it can be of general use for applications which consider these techniques adequate.

Authentication (and other security services) can only be provided within the context of a defined security policy. It is a matter for users of an application to define their own security policy.

الأكثر مبيعاً

GSO 150-2:2013
 
مواصفة قياسية خليجية
فترات صلاحية المنتجات الغذائية - الجزء الثاني : فترات الصلاحية الاختيارية
OS GSO 150-2:2013
GSO 150-2:2013 
مواصفة قياسية عمانية
فترات صلاحية المنتجات الغذائية - الجزء الثاني : فترات الصلاحية الاختيارية
OS GSO 2055-1:2015
GSO 2055-1:2015 
مواصفة قياسية عمانية
الأغذية الحلال – الجزء الأول : الاشتراطات العامة للأغذية الحلال
GSO 2055-1:2015
 
لائحة فنية خليجية
الأغذية الحلال – الجزء الأول : الاشتراطات العامة للأغذية الحلال

اعتمدت مؤخراً

ISO 7718-2:2025
 
مواصفة قياسية دولية
Aircraft — Passenger doors interface requirements for connection of passenger boarding bridge or passenger transfer vehicle — Part 2: Upper deck doors
ISO/IEC/IEEE 32430:2025
 
مواصفة قياسية دولية
Software engineering — Software non-functional size measurement
ISO 10218-1:2025
 
مواصفة قياسية دولية
Robotics — Safety requirements — Part 1: Industrial robots
ISO 10218-2:2025
 
مواصفة قياسية دولية
Robotics — Safety requirements — Part 2: Industrial robot applications and robot cells