PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.030 IT Security>BS ISO/IEC TR 14516:2002 Information technology. Security techniques. Guidelines for the use and management of trusted third party services
immediate downloadReleased: 2002-08-05
BS ISO/IEC TR 14516:2002 Information technology. Security techniques. Guidelines for the use and management of trusted third party services

BS ISO/IEC TR 14516:2002

Information technology. Security techniques. Guidelines for the use and management of trusted third party services

Format
Availability
Price and currency
English Secure PDF
Immediate download
317.20 USD
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
31.72 USD
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
95.16 USD
English Hardcopy
In stock
317.20 USD
Standard number:BS ISO/IEC TR 14516:2002
Pages:42
Released:2002-08-05
ISBN:0 580 40180 4
Status:Standard
DESCRIPTION

BS ISO/IEC TR 14516:2002


This standard BS ISO/IEC TR 14516:2002 Information technology. Security techniques. Guidelines for the use and management of trusted third party services is classified in these ICS categories:
  • 35.030 IT Security

Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and services, etc. This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP services, the generic security requirements, who should provide what type of security, what the possible security solutions are, and the operational use and management of TTP service security.

This Recommendation | Technical Report provides guidance for the use and management of TTPs, a clear definition of the basic duties and services provided, their description and their purpose, and the roles and liabilities of TTPs and entities using their services. It is intended primarily for system managers, developers, TTP operators and enterprise users to select those TTP services needed for particular requirements, their subsequent management, use and operational deployment, and the establishment of a Security Policy within a TTP. It is not intended to be used as a basis for a formal assessment of a TTP or a comparison of TTPs.

This Recommendation | Technical Report identifies different major categories of TTP services including: time stamping, non-repudiation, key management, certificate management, and electronic notary public. Each of these major categories consists of several services which logically belong together.