Detaljer på forslag

Forslagstitel på sprog (en): Information technology – Open systems interconnection – Part 8: The Directory: Public-key and attribute certificate frameworks – Amendment 1
Nummer:DSF/ISO/IEC 9594-8:2020/DAmd 1
Type:Forslag
Kilde:ISO
Udvalg:S-441
Udvalgsnavn:Cyber- og informationssikkerhed
Forslag udgivet:29. maj 2024
Kommentarfrist:28. jul 2024
Antal kommentarer:0
Beskrivelse af forslaget:This document addresses some of the security requirements in the areas of authentication and other security services through the provision of a set of frameworks upon which full services can be based. Specifically, this Recommendation | International Standard defines frameworks for: – public-key certificates; and – attribute certificates. The public-key certificate framework defined in this Recommendation | International Standard specifies the information objects and data types for a public-key infrastructure (PKI), including public-key certificates, certificate revocation lists (CRLs), trust broker and authorization and validation lists (AVLs). The attribute certificate framework specifies the information objects and data types for a privilege management infrastructure (PMI), including attribute certificates, and attribute certificate revocation lists (ACRLs). This Recommendation | International Standard also provides the framework for issuing, managing, using and revoking certificates. An extensibility mechanism is included in the defined formats for both certificate types and for all revocation list schemes. This Recommendation | International Standard also includes a set of extensions, which is expected to be generally useful across a number of applications of PKI and PMI. The schema components (including object classes, attribute types and matching rules) for storing PKI and PMI information in a directory, are included in this Recommendation | International Standard. This Recommendation | International Standard specifies the framework for strong authentication, involving credentials formed using cryptographic techniques. It is not intended to establish this as a general framework for authentication, but it can be of general use for applications which consider these techniques adequate. Authentication (and other security services) can only be provided within the context of a defined security policy. It is a matter for users of an application to define their own security policy.

Du kan kommentere på alle dele af dette dokument. Forslag vises i ét af to formater:

PDF-version
HTML-version

Hvis du ser indholdsfortegnelsen i venstre side, er det HTML-formatet. For at kommentere skal du åbne de enkelte afsnit ved at klikke på afsnittet i indholdsfortegnelsen.

Hvis du i stedet bliver bedt om at downloade et dokument, er det PDF-formatet. Du skal åbne dokumentet i et separat vindue og derefter kommentere ved at angive afsnitsnummer eller -tekst i "Sektion". Der er mere vejledning, når du har klikket på "Læs forslag".

For at afsende kommentar til Dansk Standard, skal du klikke på "Send kommentar" for det aktuelle afsnit.. Hvis du ønsker at arbejde videre med dine kommentarer, skal du i stedet klikke på "Gem kommentar til senere redigering".

Du kan tilføje og ændre i gemte kommentarer, men hvis du sender kommentaren, kan du ikke vende tilbage for at redigere.

Hvis du har gemte kommentarer, som ikke er afsendt, vil du, før høringsperioden udløber, blive mindet om, at du har ikke-afsendte kommentarer.