{"id":231247,"date":"2024-10-19T15:03:31","date_gmt":"2024-10-19T15:03:31","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-iso-ts-192992015\/"},"modified":"2024-10-25T09:22:03","modified_gmt":"2024-10-25T09:22:03","slug":"bsi-pd-cen-iso-ts-192992015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-iso-ts-192992015\/","title":{"rendered":"BSI PD CEN ISO\/TS 19299:2015"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
4<\/td>\nContents Page <\/td>\n<\/tr>\n
5<\/td>\nEuropean foreword <\/td>\n<\/tr>\n
8<\/td>\nForeword <\/td>\n<\/tr>\n
9<\/td>\nIntroduction <\/td>\n<\/tr>\n
15<\/td>\n1\tScope <\/td>\n<\/tr>\n
16<\/td>\n2\tNormative references <\/td>\n<\/tr>\n
18<\/td>\n3\tTerms and definitions <\/td>\n<\/tr>\n
23<\/td>\n4\tSymbols and abbreviated terms <\/td>\n<\/tr>\n
24<\/td>\n5\tTrust model
5.1\tOverview
5.2\tStakeholders trust relations <\/td>\n<\/tr>\n
25<\/td>\n5.3\tTechnical trust model
5.3.1\tGeneral
5.3.2\tTrust model for TC and TSP relations <\/td>\n<\/tr>\n
27<\/td>\n5.3.3\tTrust model for TSP and service user relations
5.3.4\tTrust model for Interoperability Management relations
5.4\tImplementation
5.4.1\tSetup of trust relations <\/td>\n<\/tr>\n
28<\/td>\n5.4.2\tTrust relation renewal and revocation
5.4.3\tIssuing and revocation of sub CA and end-entity certificates <\/td>\n<\/tr>\n
29<\/td>\n5.4.4\tCertificate and certificate revocation list profile and format
5.4.5\tCertificate extensions <\/td>\n<\/tr>\n
31<\/td>\n6\tSecurity requirements
6.1\tGeneral <\/td>\n<\/tr>\n
32<\/td>\n6.2\tInformation security management system
6.3\tCommunication interfaces <\/td>\n<\/tr>\n
33<\/td>\n6.4\tData storage
6.5\tToll charger <\/td>\n<\/tr>\n
35<\/td>\n6.6\tToll service provider <\/td>\n<\/tr>\n
37<\/td>\n6.7\tInteroperability Management
6.8\tLimitation of requirements <\/td>\n<\/tr>\n
38<\/td>\n7\tSecurity measures \u2014 countermeasures
7.1\tOverview
7.2\tGeneral security measures <\/td>\n<\/tr>\n
39<\/td>\n7.3\tCommunication interfaces security measures
7.3.1\tGeneral <\/td>\n<\/tr>\n
40<\/td>\n7.3.2\tDSRC-EFC interface <\/td>\n<\/tr>\n
41<\/td>\n7.3.3\tCCC interface <\/td>\n<\/tr>\n
42<\/td>\n7.3.4\tLAC interface
7.3.5\tFront End to TSP back end interface <\/td>\n<\/tr>\n
43<\/td>\n7.3.6\tTC to TSP interface <\/td>\n<\/tr>\n
44<\/td>\n7.3.7\tICC interface
7.4\tEnd-to-end security measures <\/td>\n<\/tr>\n
46<\/td>\n7.5\tToll service provider security measures
7.5.1\tFront end security measures <\/td>\n<\/tr>\n
47<\/td>\n7.5.2\tBack end security measures <\/td>\n<\/tr>\n
48<\/td>\n7.6\tToll charger security measures
7.6.1\tRSE security measures
7.6.2\tBack end security measures <\/td>\n<\/tr>\n
49<\/td>\n7.6.3\tOther TC security measures
8\tSecurity specifications for interoperable interface implementation
8.1\tGeneral
8.1.1\tSubject
8.1.2\tSignature and hash algorithms <\/td>\n<\/tr>\n
50<\/td>\n8.2\tSecurity specifications for DSRC-EFC
8.2.1\tSubject
8.2.2\tOBE
8.2.3\tRSE
9\tKey management
9.1\tOverview
9.2\tAsymmetric keys
9.2.1\tKey exchange between stakeholders <\/td>\n<\/tr>\n
51<\/td>\n9.2.2\tKey generation and certification
9.2.3\tProtection of keys
9.2.4\tApplication <\/td>\n<\/tr>\n
52<\/td>\n9.3\tSymmetric keys
9.3.1\tGeneral
9.3.2\tKey exchange between stakeholders <\/td>\n<\/tr>\n
53<\/td>\n9.3.3\tKey lifecycle <\/td>\n<\/tr>\n
54<\/td>\n9.3.4\tKey storage and protection <\/td>\n<\/tr>\n
55<\/td>\n9.3.5\tSession keys <\/td>\n<\/tr>\n
56<\/td>\nAnnex\u00a0A (normative) Security profiles <\/td>\n<\/tr>\n
60<\/td>\nAnnex\u00a0B (normative) Implementation conformance statement (ICS) proforma <\/td>\n<\/tr>\n
78<\/td>\nAnnex\u00a0C (informative) Stakeholder objectives and generic requirements <\/td>\n<\/tr>\n
82<\/td>\nAnnex\u00a0D (informative) Threat analysis <\/td>\n<\/tr>\n
138<\/td>\nAnnex\u00a0E (informative) Security policies <\/td>\n<\/tr>\n
145<\/td>\nAnnex\u00a0F (informative) Example for an EETS security policy <\/td>\n<\/tr>\n
147<\/td>\nAnnex\u00a0G (informative) Recommendations for privacy-focused implementation <\/td>\n<\/tr>\n
149<\/td>\nAnnex\u00a0H (informative) Proposal for end-entity certificates <\/td>\n<\/tr>\n
150<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Electronic fee collection. Security framework<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2015<\/td>\n154<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":231252,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[108,2641],"product_tag":[],"class_list":{"0":"post-231247","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-03-220-20","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/231247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/231252"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=231247"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=231247"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=231247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}