Перелік міжнародних та європейських стандартів, інших актів технічного регулювання для гармонізації з метою реформування, розвитку та забезпечення інтероперабельності системи електронного цифрового підпису — визначений наказом Міністерства юстиції України, Адміністрації Державної служби спеціального зв'язку та захисту інформації України 05.12.2013 № 2563/5/645 (у редакції наказу Міністерства юстиції України, Адміністрації Державної служби спеціального зв'язку та захисту інформації України 25.12.2014 № 2170/5/703).
Криптографічні механізми та протоколи електронного цифрового підпису
- ISO/IEC 9796-2:2010 «Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms».
- ISO/IEC 9796-3:2006 «Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms».
- ISO/IEC 14888-1:2008 «Information technology — Security techniques — Digital signatures with appendix — Part 1: General».
- ISO/IEC 14888-2:2008 «Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms».
- ISO/IEC 14888-3:2006 «Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms».
- ISO/IEC 15946-1:2008 «Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General».
- ISO/IEC 15946-5:2009 «Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation».
Інфраструктура відкритих ключів
- ISO/IEC 18014-1:2008 «Information technology — Security techniques — Time-stamping services — Part 1: Framework».
- ISO/IEC 18014-2:2009 «Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens».
- ISO/IEC 18014-3:2009 «Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens».
- ISO/IEC 9594-8:2008 «Information technology — Open Systems Interconnection — The Directory: Public-key and attribute certificate frameworks».
Управління ключами
- ISO/IEC 11770-1:2010 «Information technology — Security techniques — Key management — Part 1: Framework».
- ISO/IEC 11770-2:2008 «Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques».
- ISO/IEC 11770-3:2008 «Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques».
- ISO/IEC 11770-4:2006 «Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets».
- ISO/IEC 11770-5:2011 «Information technology — Security techniques — Key management — Part 5: Group key management».
Геш-функції та коди автентифікації повідомлень
- ISO/IEC 9797-1:2011 «Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher».
- SO/IEC 9797-2:2011 «Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function».
- ISO/IEC 9797-3:2011 «Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function».
- ISO/IEC 10118-1:2003 «Information technology — Security techniques — Hash-functions — Part 1: General».
- ISO/IEC 10118-2:2010 «Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher».
- ISO/IEC 10118-3:2005 «Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions».
- ISO/IEC 10118-4:1998 «Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic».
Криптографічні протоколи автентифікації та ідентифікації
- ISO/IEC 9798-1:2010 «Information technology — Security techniques — Entity authentication — Part 1: General».
- ISO/IEC 9798-2:2008 «Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms».
- ISO/IEC 9798-3:1998 «Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques».
- ISO/IEC 9798-4:1999 «Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function».
- ISO/IEC 9798-5:2009 «Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques».
- ISO/IEC 9798-6:2010 «Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer».
- ISO/IEC FDIS 29115 «Information technology — Security techniques — Entity authentication assurance framework».
- ISO/IEC 29191:2012 «Information technology — Security techniques — Requirements for partially anonymous, partially unlink able authentication».
Алгоритми генерації та тестування послідовностей випадкових чисел
- ISO/IEC 18031:2011 «Information technology — Security techniques — Random bit generation».
- ISO/IEC 18032:2005 «Information technology — Security techniques — Prime number generation».
Механізми неспростовності
- ISO/IEC 13888-1:2009 «Information technology — Security techniques — Non-repudiation — Part 1: General».
- ISO/IEC 13888-2:2010 «Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques».
- ISO/IEC 13888-3:2009 «Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques».
Методи шифрування
- ISO/IEC 10116:2006 «Information technology — Security techniques — Modes of operation for an n-bit block cipher».
- ISO/IEC 18033-1:2005 «Information technology — Security techniques — Encryption algorithms — Part 1: General».
- ISO/IEC 18033-2:2006 «Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers».
- ISO/IEC 18033-3:2010 «Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers».
- ISO/IEC 18033-4:2011 «Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers».
Вимоги до криптомодулів
- ISO/IEC 19790:2012 «Information technology — Security techniques — Security requirements for cryptographic modules».
- ISO/IEC DIS 24759 «Information technology — Security techniques — Test requirements for cryptographic modules».
Механізми приватності
- ISO/IEC 29100:2011 «Information technology — Security techniques — Privacy framework».
Методи та механізми захисту від несанкціонованого доступу
- ISO/IEC 15408-1:2009 «Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model».
- ISO/IEC 15408-2:2008 «Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components».
- ISO/IEC 15408-3:2008 «Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components».
- ISO/IEC TR 15446:2009 «Information technology — Security techniques — Guide for the production of Protection Profiles and Security Targets».
- ISO/IEC 18045:2008 «Information technology — Security techniques — Methodology for IT security evaluation».
- ISO/IEC TR 19791:2010 «Information technology — Security techniques — Security assessment of operational systems».
Стандартизація у сфері біометрики
- ISO/IEC 19792:2009 «Information technology — Security techniques — Security evaluation of biometrics».
- ISO/IEC 24745:2011 «Information technology — Security techniques — Biometric information protection».
- ISO/IEC 24761:2009 «Information technology — Security techniques — Authentication context for biometrics».
Стандарти CWA
- CWA 14167-1:2003 «Security Requirements for Trust worthy Systems Managing Certificates for Electronic Signatures — Part 1: System Security Requirements».
- CWA 14167-2:2004 «Cryptographic module for CSP signing operations with backup — Protection profile — CMCSOB PP».
- CWA 14167-4:2004 «Cryptographic module for CSP signing operations — Protection profile — CMCSO PP».
- CWA 14169:2004 «Secure signature-creation devices „EAL 4+“.
- CWA 16093:2010 „Feasibility Study for a Global eBusiness Interoperability Test Bed (GTIB)“.
- CWA 16022:2009 „Project Schedule and Cost Performance Management (PSCPM)“.
- CWA 15994:2009 „eTendering Process“.
- CWA 15666:2007 „Business Requirements Specification, Cross industry e-Tendering process“.
- CWA 15667:2007 „Business Requirements Specification, Cross industry Catalogue Process“.
- CWA 15668:2007 „Business Requirements Specification, Cross industry Invoicing Process“.
- CWA 15669-1:2007 „Business requirements specification — Cross industry ordering process — Part 1: Global ordering process model definition“.
- CWA 15669-2:2007 „Business requirements specification — Cross industry ordering process — Part 2: Order transaction“.
- CWA 15669-3:2007 „Business requirements specification — Cross industry ordering process — Part 3: Order change transaction“.
- CWA 15669-4:2007 „Business requirements specification — Cross industry ordering process — Part 4: Order response transaction“.
- CWA 15670:2007 „Business Requirements Specification, Cross industry Remittance Advice Process“.
- CWA 15671:2007 „Business Requirements Specification, Cross industry Scheduling Process“.
- CWA 15672:2007 „Business Requirements Specification, Cross industry Despatch and Receive Process“.
- CWA 15066:2004 „SAD Transit Declaration — Implementation Model“.
- CWA 15065:2004 „SAD Exports Declaration — Implementation Model“.
- CWA 15672:2007 „Business Requirements Specification, Cross industry Despatch and Receive Process“.
- CWA 15066:2004 „SAD Transit Declaration — Implementation Model“.
- CWA 15065:2004 „SAD Exports Declaration — Implementation Model“.
- CWA 15064:2004 „SAD Imports Declaration — Implementation Model“.
- CWA 14729-1:2003 „The Intrastat System — Part 1: The Implementation Model“.
- CWA 14729-3:2003 „The Intrastat System — Part 3: Message Implementation Guideline of INSRES/XML“.
Стандарти ETSI
- ETSI TS 101 456:2005 „Electronic Signatures and Infrastructures (ESI). Policy Requirements for certification authorities issuing qualified certificates“.
- ETSI TR 102 437:2006 „Electronic Signatures and Infrastructures (ESI); Guidance on TS 101 456 (Policy Requirements for certification authorities issuing qualified certificates)“.
- ETSI TS 102 778:2009 „Electronic Signatures and Infrastructures (ESI). — PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1“.
- ETSI TS 102 778-1:2009 „Electronic Signatures and Infrastructures (ESI). — PDF Advanced Electronic Signature Profiles. — Part 1: PAdES Overview — a framework document for PAdES“.
- ETSI TS 102 778-2:2009 „Electronic Signatures and Infrastructures (ESI) — PDF Advanced Electronic Signature Profiles — Part 2: PAdES Basic — Profile based on ISO 32000-1“.
- ETSI TS 102 778-3:2009 „Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 3: PAdES Enhanced — PadES-BES and PAdES-EPES Profiles“.
- ETSI TS 102 778-4:2009 „Electronic Signatures and Infrastructures (ESI) — PDF Advanced Electronic Signature Profiles — Part 4: PAdES Long Term — PadES LTV Profile“.
- ETSI TS 102 778-5:2009 „Electronic Signatures and Infrastructures (ESI) — PDF Advanced Electronic Signature Profiles — Part 5: PAdES for XML Content — Profiles for XAdES signatures“.
- ETSI TS 102 231:2006 „Electronic Signatures and Infrastructures (ESI) — Provision of harmonized Trust-service status information“.
- ETSI TR 102 272:2003 „Electronic Signatures and Infrastructures (ESI); ASN.1 format for signature policies“.
- ETSI TR 102 158:2003 „Electronic Signatures and Infrastructures (ESI); Policy requirements for Certification Service Providers issuing attribute certificates usable with Qualified certificates“.
Рекомендації RFC
- RFC 3739 Internet X.509 „Public Key Infrastructure: Qualified Certificates Profile“.
- RFC 4510 „Lightweight Directory Access Protocol (LDAP): Technical Specification Road Map“.
- RFC 4511 „Lightweight Directory Access Protocol (LDAP): The Protocol“
- RFC 4512 „Lightweight Directory Access Protocol (LDAP): Directory Information Models“.
- RFC 4513 „Lightweight Directory Access Protocol (LDAP): Authentication Methods and Security Mechanisms“.
- RFC 4514 „Lightweight Directory Access Protocol (LDAP): String Representation of Distinguished Names“.
- RFC 4515 „Lightweight Directory Access Protocol (LDAP): String Representation of Search Filters“.
- RFC 4516 „Lightweight Directory Access Protocol (LDAP): Uniform Resource Locator“.
- RFC 4517 „Lightweight Directory Access Protocol (LDAP): Syntaxes and Matching Rules“.
- RFC 4518 „Lightweight Directory Access Protocol (LDAP): Internationalized String Preparation“.
- RFC 4519 „Lightweight Directory Access Protocol (LDAP): Schema for User Applications“.
- RFC 4523 „Lightweight Directory Access Protocol (LDAP) Schema Definitions for X.509 Certificates“.
- RFC 421 Internet X.509 „Public Key Infrastructure Certificate Request Message Format (CRMF)“.
- RFC 5652 „Cryptographic Message Syntax (CMS)“.
- RFC 2560 „Internet X.509 Public Key Infrastructure Online Certificate Status Protocol — OCSP“.
- RFC 2631 „Diffie-Hellman Key Agreement Method“, June 1999».
- RFC 3161 «Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)».
- RFC 3370 «Cryptographic Message Syntax (CMS) Algorithms», August 2002".
- RFC 3852 «Cryptographic Message Syntax (CMS)», July 2004".
Рекомендації PKCS
- PKCS #5 «Password-Based Cryptography Standard».
- PKCS #8 «Private-Key Information Syntax Standard».
- PKCS #10 «Certification Request Syntax Specification».
- PKCS #11 «Cryptographic Token Interface (Cryptoki)».
- PKCS #12 «Personal Information Exchange Syntax Standard»
- PKCS #15 «Cryptographic Token Information Format Standard».
- W3C Recommendation 10 June 2008 XML «Signature Syntax and Processing (Second Edition)».
Управління інформаційною безпекою
- ISO/IEC 27000:2013 «Information technology — Security techniques — Information security management systems — Overview and vocabulary».
- ISO/IEC 27001:2013 «Information technology — Security techniques — Information security management systems — Requirements».
- ISO/IEC 27002:2013 «Information technology — Security techniques — Code of practice for information security controls».
- ITAF, 3d Edition «A Professional Practices Framework for IS Audit/Assurance».
- ISO/IEC 27005:2011 «Information technology — Security techniques — Information security risk management».
- ISO/IEC 27006:2007 «Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems».
- ISO/IEC 27007:2011 «Information technology — Security techniques — Guidelines for information security management systems auditing».
- ISO/IEC TR 27008:2011 «Information technology — Security techniques — Guidelines for auditors on information security management systems controls».
- ISO/IEC 27010:2012 «Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications».
- ISO/IEC 27031:2011 «Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity».
- ISO/IEC 27033-1:2009 «Information technology — Security techniques — Network security — Part 1: Overview and concepts».
- ISO/IEC 27033-2:2012 «Information technology — Security techniques — Network security — Part 2: Guidelines for the design and implementation of network security».
- ISO/IEC 27033-3:2010 «Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues».
- ISO/IEC 27033-4:2013 Information technology — Security techniques — Network security — Part 4: Securing communications between networks using security gateways
- ISO/IEC 27033-5:2013 «Information technology — Security techniques — Network security — Part 5: Securing communications across networks using Virtual Private Network (VPNs)».
- ISO/IEC27035:2011 «Information technology — Security techniques — Information security incident management».
Див. також
Примітки
- zakon4.rada.gov.ua/laws/show/v2170323-14
Вікіпедія, Українська, Україна, книга, книги, бібліотека, стаття, читати, завантажити, безкоштовно, безкоштовно завантажити, mp3, відео, mp4, 3gp, jpg, jpeg, gif, png, малюнок, музика, пісня, фільм, книга, гра, ігри, мобільний, телефон, android, ios, apple, мобільний телефон, samsung, iphone, xiomi, xiaomi, redmi, honor, oppo, nokia, sonya, mi, ПК, web, Інтернет
Perelik mizhnarodnih ta yevropejskih standartiv inshih aktiv tehnichnogo regulyuvannya dlya garmonizaciyi z metoyu reformuvannya rozvitku ta zabezpechennya interoperabelnosti sistemi elektronnogo cifrovogo pidpisu viznachenij nakazom Ministerstva yusticiyi Ukrayini Administraciyi Derzhavnoyi sluzhbi specialnogo zv yazku ta zahistu informaciyi Ukrayini 05 12 2013 2563 5 645 u redakciyi nakazu Ministerstva yusticiyi Ukrayini Administraciyi Derzhavnoyi sluzhbi specialnogo zv yazku ta zahistu informaciyi Ukrayini 25 12 2014 2170 5 703 Kriptografichni mehanizmi ta protokoli elektronnogo cifrovogo pidpisuDokladnishe Elektronnij cifrovij pidpis ISO IEC 9796 2 2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2 Integer factorization based mechanisms ISO IEC 9796 3 2006 Information technology Security techniques Digital signature schemes giving message recovery Part 3 Discrete logarithm based mechanisms ISO IEC 14888 1 2008 Information technology Security techniques Digital signatures with appendix Part 1 General ISO IEC 14888 2 2008 Information technology Security techniques Digital signatures with appendix Part 2 Integer factorization based mechanisms ISO IEC 14888 3 2006 Information technology Security techniques Digital signatures with appendix Part 3 Discrete logarithm based mechanisms ISO IEC 15946 1 2008 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1 General ISO IEC 15946 5 2009 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5 Elliptic curve generation Infrastruktura vidkritih klyuchivDokladnishe Infrastruktura vidkritih klyuchiv ISO IEC 18014 1 2008 Information technology Security techniques Time stamping services Part 1 Framework ISO IEC 18014 2 2009 Information technology Security techniques Time stamping services Part 2 Mechanisms producing independent tokens ISO IEC 18014 3 2009 Information technology Security techniques Time stamping services Part 3 Mechanisms producing linked tokens ISO IEC 9594 8 2008 Information technology Open Systems Interconnection The Directory Public key and attribute certificate frameworks Upravlinnya klyuchamiDokladnishe Upravlinnya klyuchami ISO IEC 11770 1 2010 Information technology Security techniques Key management Part 1 Framework ISO IEC 11770 2 2008 Information technology Security techniques Key management Part 2 Mechanisms using symmetric techniques ISO IEC 11770 3 2008 Information technology Security techniques Key management Part 3 Mechanisms using asymmetric techniques ISO IEC 11770 4 2006 Information technology Security techniques Key management Part 4 Mechanisms based on weak secrets ISO IEC 11770 5 2011 Information technology Security techniques Key management Part 5 Group key management Gesh funkciyi ta kodi avtentifikaciyi povidomlenDokladnishe Gesh funkciya ta MAC pidpis ISO IEC 9797 1 2011 Information technology Security techniques Message Authentication Codes MACs Part 1 Mechanisms using a block cipher SO IEC 9797 2 2011 Information technology Security techniques Message Authentication Codes MACs Part 2 Mechanisms using a dedicated hash function ISO IEC 9797 3 2011 Information technology Security techniques Message Authentication Codes MACs Part 3 Mechanisms using a universal hash function ISO IEC 10118 1 2003 Information technology Security techniques Hash functions Part 1 General ISO IEC 10118 2 2010 Information technology Security techniques Hash functions Part 2 Hash functions using an n bit block cipher ISO IEC 10118 3 2005 Information technology Security techniques Hash functions Part 3 Dedicated hash functions ISO IEC 10118 4 1998 Information technology Security techniques Hash functions Part 4 Hash functions using modular arithmetic Kriptografichni protokoli avtentifikaciyi ta identifikaciyiISO IEC 9798 1 2010 Information technology Security techniques Entity authentication Part 1 General ISO IEC 9798 2 2008 Information technology Security techniques Entity authentication Part 2 Mechanisms using symmetric encipherment algorithms ISO IEC 9798 3 1998 Information technology Security techniques Entity authentication Part 3 Mechanisms using digital signature techniques ISO IEC 9798 4 1999 Information technology Security techniques Entity authentication Part 4 Mechanisms using a cryptographic check function ISO IEC 9798 5 2009 Information technology Security techniques Entity authentication Part 5 Mechanisms using zero knowledge techniques ISO IEC 9798 6 2010 Information technology Security techniques Entity authentication Part 6 Mechanisms using manual data transfer ISO IEC FDIS 29115 Information technology Security techniques Entity authentication assurance framework ISO IEC 29191 2012 Information technology Security techniques Requirements for partially anonymous partially unlink able authentication Algoritmi generaciyi ta testuvannya poslidovnostej vipadkovih chiselDokladnishe Generator psevdovipadkovih chisel ISO IEC 18031 2011 Information technology Security techniques Random bit generation ISO IEC 18032 2005 Information technology Security techniques Prime number generation Mehanizmi nesprostovnostiISO IEC 13888 1 2009 Information technology Security techniques Non repudiation Part 1 General ISO IEC 13888 2 2010 Information technology Security techniques Non repudiation Part 2 Mechanisms using symmetric techniques ISO IEC 13888 3 2009 Information technology Security techniques Non repudiation Part 3 Mechanisms using asymmetric techniques Metodi shifruvannyaISO IEC 10116 2006 Information technology Security techniques Modes of operation for an n bit block cipher ISO IEC 18033 1 2005 Information technology Security techniques Encryption algorithms Part 1 General ISO IEC 18033 2 2006 Information technology Security techniques Encryption algorithms Part 2 Asymmetric ciphers ISO IEC 18033 3 2010 Information technology Security techniques Encryption algorithms Part 3 Block ciphers ISO IEC 18033 4 2011 Information technology Security techniques Encryption algorithms Part 4 Stream ciphers Vimogi do kriptomodulivISO IEC 19790 2012 Information technology Security techniques Security requirements for cryptographic modules ISO IEC DIS 24759 Information technology Security techniques Test requirements for cryptographic modules Mehanizmi privatnostiISO IEC 29100 2011 Information technology Security techniques Privacy framework Metodi ta mehanizmi zahistu vid nesankcionovanogo dostupuISO IEC 15408 1 2009 Information technology Security techniques Evaluation criteria for IT security Part 1 Introduction and general model ISO IEC 15408 2 2008 Information technology Security techniques Evaluation criteria for IT security Part 2 Security functional components ISO IEC 15408 3 2008 Information technology Security techniques Evaluation criteria for IT security Part 3 Security assurance components ISO IEC TR 15446 2009 Information technology Security techniques Guide for the production of Protection Profiles and Security Targets ISO IEC 18045 2008 Information technology Security techniques Methodology for IT security evaluation ISO IEC TR 19791 2010 Information technology Security techniques Security assessment of operational systems Standartizaciya u sferi biometrikiISO IEC 19792 2009 Information technology Security techniques Security evaluation of biometrics ISO IEC 24745 2011 Information technology Security techniques Biometric information protection ISO IEC 24761 2009 Information technology Security techniques Authentication context for biometrics Standarti CWADiv takozh Yevropejskij komitet zi standartizaciyi CWA 14167 1 2003 Security Requirements for Trust worthy Systems Managing Certificates for Electronic Signatures Part 1 System Security Requirements CWA 14167 2 2004 Cryptographic module for CSP signing operations with backup Protection profile CMCSOB PP CWA 14167 4 2004 Cryptographic module for CSP signing operations Protection profile CMCSO PP CWA 14169 2004 Secure signature creation devices EAL 4 CWA 16093 2010 Feasibility Study for a Global eBusiness Interoperability Test Bed GTIB CWA 16022 2009 Project Schedule and Cost Performance Management PSCPM CWA 15994 2009 eTendering Process CWA 15666 2007 Business Requirements Specification Cross industry e Tendering process CWA 15667 2007 Business Requirements Specification Cross industry Catalogue Process CWA 15668 2007 Business Requirements Specification Cross industry Invoicing Process CWA 15669 1 2007 Business requirements specification Cross industry ordering process Part 1 Global ordering process model definition CWA 15669 2 2007 Business requirements specification Cross industry ordering process Part 2 Order transaction CWA 15669 3 2007 Business requirements specification Cross industry ordering process Part 3 Order change transaction CWA 15669 4 2007 Business requirements specification Cross industry ordering process Part 4 Order response transaction CWA 15670 2007 Business Requirements Specification Cross industry Remittance Advice Process CWA 15671 2007 Business Requirements Specification Cross industry Scheduling Process CWA 15672 2007 Business Requirements Specification Cross industry Despatch and Receive Process CWA 15066 2004 SAD Transit Declaration Implementation Model CWA 15065 2004 SAD Exports Declaration Implementation Model CWA 15672 2007 Business Requirements Specification Cross industry Despatch and Receive Process CWA 15066 2004 SAD Transit Declaration Implementation Model CWA 15065 2004 SAD Exports Declaration Implementation Model CWA 15064 2004 SAD Imports Declaration Implementation Model CWA 14729 1 2003 The Intrastat System Part 1 The Implementation Model CWA 14729 3 2003 The Intrastat System Part 3 Message Implementation Guideline of INSRES XML Standarti ETSIDiv takozh Yevropejskij institut telekomunikacijnih standartiv ETSI TS 101 456 2005 Electronic Signatures and Infrastructures ESI Policy Requirements for certification authorities issuing qualified certificates ETSI TR 102 437 2006 Electronic Signatures and Infrastructures ESI Guidance on TS 101 456 Policy Requirements for certification authorities issuing qualified certificates ETSI TS 102 778 2009 Electronic Signatures and Infrastructures ESI PDF Advanced Electronic Signature Profiles CMS Profile based on ISO 32000 1 ETSI TS 102 778 1 2009 Electronic Signatures and Infrastructures ESI PDF Advanced Electronic Signature Profiles Part 1 PAdES Overview a framework document for PAdES ETSI TS 102 778 2 2009 Electronic Signatures and Infrastructures ESI PDF Advanced Electronic Signature Profiles Part 2 PAdES Basic Profile based on ISO 32000 1 ETSI TS 102 778 3 2009 Electronic Signatures and Infrastructures ESI PDF Advanced Electronic Signature Profiles Part 3 PAdES Enhanced PadES BES and PAdES EPES Profiles ETSI TS 102 778 4 2009 Electronic Signatures and Infrastructures ESI PDF Advanced Electronic Signature Profiles Part 4 PAdES Long Term PadES LTV Profile ETSI TS 102 778 5 2009 Electronic Signatures and Infrastructures ESI PDF Advanced Electronic Signature Profiles Part 5 PAdES for XML Content Profiles for XAdES signatures ETSI TS 102 231 2006 Electronic Signatures and Infrastructures ESI Provision of harmonized Trust service status information ETSI TR 102 272 2003 Electronic Signatures and Infrastructures ESI ASN 1 format for signature policies ETSI TR 102 158 2003 Electronic Signatures and Infrastructures ESI Policy requirements for Certification Service Providers issuing attribute certificates usable with Qualified certificates Rekomendaciyi RFCDiv takozh RFC RFC 3739 Internet X 509 Public Key Infrastructure Qualified Certificates Profile RFC 4510 Lightweight Directory Access Protocol LDAP Technical Specification Road Map RFC 4511 Lightweight Directory Access Protocol LDAP The Protocol RFC 4512 Lightweight Directory Access Protocol LDAP Directory Information Models RFC 4513 Lightweight Directory Access Protocol LDAP Authentication Methods and Security Mechanisms RFC 4514 Lightweight Directory Access Protocol LDAP String Representation of Distinguished Names RFC 4515 Lightweight Directory Access Protocol LDAP String Representation of Search Filters RFC 4516 Lightweight Directory Access Protocol LDAP Uniform Resource Locator RFC 4517 Lightweight Directory Access Protocol LDAP Syntaxes and Matching Rules RFC 4518 Lightweight Directory Access Protocol LDAP Internationalized String Preparation RFC 4519 Lightweight Directory Access Protocol LDAP Schema for User Applications RFC 4523 Lightweight Directory Access Protocol LDAP Schema Definitions for X 509 Certificates RFC 421 Internet X 509 Public Key Infrastructure Certificate Request Message Format CRMF RFC 5652 Cryptographic Message Syntax CMS RFC 2560 Internet X 509 Public Key Infrastructure Online Certificate Status Protocol OCSP RFC 2631 Diffie Hellman Key Agreement Method June 1999 RFC 3161 Internet X 509 Public Key Infrastructure Time Stamp Protocol TSP RFC 3370 Cryptographic Message Syntax CMS Algorithms August 2002 RFC 3852 Cryptographic Message Syntax CMS July 2004 Rekomendaciyi PKCSDiv takozh PKCS 5 Password Based Cryptography Standard PKCS 8 Private Key Information Syntax Standard PKCS 10 Certification Request Syntax Specification PKCS 11 Cryptographic Token Interface Cryptoki PKCS 12 Personal Information Exchange Syntax Standard PKCS 15 Cryptographic Token Information Format Standard W3C Recommendation 10 June 2008 XML Signature Syntax and Processing Second Edition Upravlinnya informacijnoyu bezpekoyuISO IEC 27000 2013 Information technology Security techniques Information security management systems Overview and vocabulary ISO IEC 27001 2013 Information technology Security techniques Information security management systems Requirements ISO IEC 27002 2013 Information technology Security techniques Code of practice for information security controls ITAF 3d Edition A Professional Practices Framework for IS Audit Assurance ISO IEC 27005 2011 Information technology Security techniques Information security risk management ISO IEC 27006 2007 Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems ISO IEC 27007 2011 Information technology Security techniques Guidelines for information security management systems auditing ISO IEC TR 27008 2011 Information technology Security techniques Guidelines for auditors on information security management systems controls ISO IEC 27010 2012 Information technology Security techniques Information security management for inter sector and inter organizational communications ISO IEC 27031 2011 Information technology Security techniques Guidelines for information and communication technology readiness for business continuity ISO IEC 27033 1 2009 Information technology Security techniques Network security Part 1 Overview and concepts ISO IEC 27033 2 2012 Information technology Security techniques Network security Part 2 Guidelines for the design and implementation of network security ISO IEC 27033 3 2010 Information technology Security techniques Network security Part 3 Reference networking scenarios Threats design techniques and control issues ISO IEC 27033 4 2013 Information technology Security techniques Network security Part 4 Securing communications between networks using security gateways ISO IEC 27033 5 2013 Information technology Security techniques Network security Part 5 Securing communications across networks using Virtual Private Network VPNs ISO IEC27035 2011 Information technology Security techniques Information security incident management Div takozhElektronnij cifrovij pidpisPrimitkizakon4 rada gov ua laws show v2170323 14