BSI PD CEN ISO/TS 19299:2015
$215.11
Electronic fee collection. Security framework
Published By | Publication Date | Number of Pages |
BSI | 2015 | 154 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
4 | Contents Page |
5 | European foreword |
8 | Foreword |
9 | Introduction |
15 | 1 Scope |
16 | 2 Normative references |
18 | 3 Terms and definitions |
23 | 4 Symbols and abbreviated terms |
24 | 5 Trust model 5.1 Overview 5.2 Stakeholders trust relations |
25 | 5.3 Technical trust model 5.3.1 General 5.3.2 Trust model for TC and TSP relations |
27 | 5.3.3 Trust model for TSP and service user relations 5.3.4 Trust model for Interoperability Management relations 5.4 Implementation 5.4.1 Setup of trust relations |
28 | 5.4.2 Trust relation renewal and revocation 5.4.3 Issuing and revocation of sub CA and end-entity certificates |
29 | 5.4.4 Certificate and certificate revocation list profile and format 5.4.5 Certificate extensions |
31 | 6 Security requirements 6.1 General |
32 | 6.2 Information security management system 6.3 Communication interfaces |
33 | 6.4 Data storage 6.5 Toll charger |
35 | 6.6 Toll service provider |
37 | 6.7 Interoperability Management 6.8 Limitation of requirements |
38 | 7 Security measures — countermeasures 7.1 Overview 7.2 General security measures |
39 | 7.3 Communication interfaces security measures 7.3.1 General |
40 | 7.3.2 DSRC-EFC interface |
41 | 7.3.3 CCC interface |
42 | 7.3.4 LAC interface 7.3.5 Front End to TSP back end interface |
43 | 7.3.6 TC to TSP interface |
44 | 7.3.7 ICC interface 7.4 End-to-end security measures |
46 | 7.5 Toll service provider security measures 7.5.1 Front end security measures |
47 | 7.5.2 Back end security measures |
48 | 7.6 Toll charger security measures 7.6.1 RSE security measures 7.6.2 Back end security measures |
49 | 7.6.3 Other TC security measures 8 Security specifications for interoperable interface implementation 8.1 General 8.1.1 Subject 8.1.2 Signature and hash algorithms |
50 | 8.2 Security specifications for DSRC-EFC 8.2.1 Subject 8.2.2 OBE 8.2.3 RSE 9 Key management 9.1 Overview 9.2 Asymmetric keys 9.2.1 Key exchange between stakeholders |
51 | 9.2.2 Key generation and certification 9.2.3 Protection of keys 9.2.4 Application |
52 | 9.3 Symmetric keys 9.3.1 General 9.3.2 Key exchange between stakeholders |
53 | 9.3.3 Key lifecycle |
54 | 9.3.4 Key storage and protection |
55 | 9.3.5 Session keys |
56 | Annex A (normative) Security profiles |
60 | Annex B (normative) Implementation conformance statement (ICS) proforma |
78 | Annex C (informative) Stakeholder objectives and generic requirements |
82 | Annex D (informative) Threat analysis |
138 | Annex E (informative) Security policies |
145 | Annex F (informative) Example for an EETS security policy |
147 | Annex G (informative) Recommendations for privacy-focused implementation |
149 | Annex H (informative) Proposal for end-entity certificates |
150 | Bibliography |