{"id":231247,"date":"2024-10-19T15:03:31","date_gmt":"2024-10-19T15:03:31","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-iso-ts-192992015\/"},"modified":"2024-10-25T09:22:03","modified_gmt":"2024-10-25T09:22:03","slug":"bsi-pd-cen-iso-ts-192992015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-iso-ts-192992015\/","title":{"rendered":"BSI PD CEN ISO\/TS 19299:2015"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | Contents Page <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | European foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 1\tScope <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 2\tNormative references <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 3\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4\tSymbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5\tTrust model 5.1\tOverview 5.2\tStakeholders trust relations <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.3\tTechnical trust model 5.3.1\tGeneral 5.3.2\tTrust model for TC and TSP relations <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.3.3\tTrust model for TSP and service user relations 5.3.4\tTrust model for Interoperability Management relations 5.4\tImplementation 5.4.1\tSetup of trust relations <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.4.2\tTrust relation renewal and revocation 5.4.3\tIssuing and revocation of sub CA and end-entity certificates <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.4.4\tCertificate and certificate revocation list profile and format 5.4.5\tCertificate extensions <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6\tSecurity requirements 6.1\tGeneral <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.2\tInformation security management system 6.3\tCommunication interfaces <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.4\tData storage 6.5\tToll charger <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.6\tToll service provider <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.7\tInteroperability Management 6.8\tLimitation of requirements <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 7\tSecurity measures \u2014 countermeasures 7.1\tOverview 7.2\tGeneral security measures <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 7.3\tCommunication interfaces security measures 7.3.1\tGeneral <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 7.3.2\tDSRC-EFC interface <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 7.3.3\tCCC interface <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 7.3.4\tLAC interface 7.3.5\tFront End to TSP back end interface <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 7.3.6\tTC to TSP interface <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 7.3.7\tICC interface 7.4\tEnd-to-end security measures <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 7.5\tToll service provider security measures 7.5.1\tFront end security measures <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 7.5.2\tBack end security measures <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 7.6\tToll charger security measures 7.6.1\tRSE security measures 7.6.2\tBack end security measures <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 7.6.3\tOther TC security measures 8\tSecurity specifications for interoperable interface implementation 8.1\tGeneral 8.1.1\tSubject 8.1.2\tSignature and hash algorithms <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 8.2\tSecurity specifications for DSRC-EFC 8.2.1\tSubject 8.2.2\tOBE 8.2.3\tRSE 9\tKey management 9.1\tOverview 9.2\tAsymmetric keys 9.2.1\tKey exchange between stakeholders <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 9.2.2\tKey generation and certification 9.2.3\tProtection of keys 9.2.4\tApplication <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 9.3\tSymmetric keys 9.3.1\tGeneral 9.3.2\tKey exchange between stakeholders <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 9.3.3\tKey lifecycle <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 9.3.4\tKey storage and protection <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 9.3.5\tSession keys <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Annex\u00a0A (normative) Security profiles <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | Annex\u00a0B (normative) Implementation conformance statement (ICS) proforma <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | Annex\u00a0C (informative) Stakeholder objectives and generic requirements <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | Annex\u00a0D (informative) Threat analysis <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | Annex\u00a0E (informative) Security policies <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | Annex\u00a0F (informative) Example for an EETS security policy <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | Annex\u00a0G (informative) Recommendations for privacy-focused implementation <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | Annex\u00a0H (informative) Proposal for end-entity certificates <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Electronic fee collection. Security framework<\/b><\/p>\n |