Publication CODE |
Title |
ISO/IEC 13888-2:2010 (2010-12) |
INFORMATION TECHNOLOGY -- SECURITY TECHNIQUES -- NON-REPUDIATION -- PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
|
Price Excl. VAT |
Total number of pages, tables and drawings |
102.00 €
|
17. |
Description
The goal of the non-repudiation service is to generate, collect, maintain, make available and validate evidence concerning a claimed event or action in order to resolve disputes about the occurrence or non-occurrence of the event or action. ISO/IEC 13888-2:2010 provides descriptions of generic structures that can be used for non-repudiation services, and of some specific communication-related mechanisms which can be used to provide non-repudiation of origin (NRO) and non-repudiation of delivery (NRD). Other non-repudiation services can be built using the generic structures described in ISO/IEC 13888-2:2010 in order to meet the requirements defined by the security policy.
ISO/IEC 13888-2:2010 relies on the existence of a trusted third party (TTP) to prevent fraudulent repudiation or accusation. Usually, an online TTP is needed.
Non-repudiation can only be provided within the context of a clearly defined security policy for a particular application and its legal environment. Non-repudiation policies are defined in ISO/IEC 10181-4.
|
Class |
C990
(IEC PUBLICATIONS IEC PUBLICATIONS)
|
Committee |
ISO/IEC JTC 1/SC 27
IT SECURITY TECHNIQUES
|
BEC Approval |
2010-12-01 |
ICS-Code (International Standards Classification) |
35.030
|
NBN Status |
New |
|
IEC publication date |
2010-12-01 |
IEC last modification date |
2014-04-14 |
|