Shopping Cart

No products in the cart.

BSI 16/30336060 DC:2016 Edition

$13.70

BS ISO/IEC 9594-8 AMD2. Information technology. Open Systems Interconnection. The Directory. Part 8. Public-key and attribute certificate frameworks

Published By Publication Date Number of Pages
BSI 2016 100
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weā€™re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
5 6N16409
General
Summary
Introduction
6 1 Scope
7 2 Normative references
2.4 International Standards
2.45 Other references
3 Definitions
3.1 OSI Reference Model security architecture definitions
3.3 Directory model definitions
8 3.5 Public-key and attribute certificate definitions
12 4 Abbreviations
13 5 Conventions
14 6 Frameworks overview
6.3 Distinguished Encoding of Basic Encoding Rules
6.4 Applying Distinguished Encoding
15 6.5 Using repositories
7 Public-keys and public-key certificates
7.1 Introduction
7.2 Public-key certificate
16 7.3 Public-key certificate extensions
7.4 Types of public-key certificates
17 7.6 Entity relationship
7.7 Certification path
18 7.8 Generation of key pairs
7.10 Certificate revocation list
7.10.1 Certificate revocation list principles
20 7.10.2 Certificate revocation list syntax
21 7.12.2 Indirect CRL contents
8 Trust Models
22 8.1 Three cornered model
8.2 Four cornered trust model
23 9 Public-key certificate and CRL extensions
9.1 Policy handling
9.1.1 Certificate policy
24 9.1.2 Cross-certificates
9.2.2 Public-key certificate and CRL extension fields
9.2.2.5 Private key usage period extension
25 9.2.2.8 Authorization validation extension
9.5.2.1 CRL number extension
9.5.2.2 CRL scope extension
9.5.2.6 To be revoked extension
27 9.5.2.7 Revoked group of certificates extension
28 9.5.3.1 Reason code extensions
9.6 CRL distribution point and delta-CRL extension (old 8.6)
9.6.1 Requirements
29 9.6.2 CRL distribution point and delta-CRL extension fields (old 8.6.2)
9.6.2.1 CRL distribution points extension
30 9.6.2.2 Issuing distribution point extension
9.6.2.3 Certificate issuer extension
9.6.2.4 Delta CRL indicator extension
31 9.6.2.6 Freshest CRL extension
9.6.2.7 AA issuing distribution point extension
11 Authorization and validation lists
11.1 Authorization and validation list concept
32 11.2 The authorizer
11.3 Authorization and validation list syntax
34 11.4 Authorization and validation restrictions
11.4.3 Protocol restrictions
12 Certification path processing procedure
12.2 Path processing outputs
35 13.2.5 End-entity public-key certificate revocation list attribute type
36 14 Attribute certificates
14.3 Attribute certificate revocation lists
14.3.1 Attribute certificate revocation list principles
37 14.3.2 Attribute certificate revocation list syntax
38 17.2.2.1 Use of CRL distribution points extension
17.2.2.2 AA issuing distribution point extension
39 17.2.2.3 Use of certificate issuer extension
17.2.2.4 Use of delta CRL indicator extension
40 17.2.2.5 Use of base update extension
17.2.2.6 Use of freshest CRL extension
17.7 Use of basic CRL extension for ACRLs
17.7.1 Requirements
17.7.2 Use of CRL extensions
17.7.2.1 Use of CRL number extension for ACRL
17.7.2.2 Use of Status referral extension for ACRL
17.7.2.3 Use of CRL stream identifier for ACRL
17.7.2.4 Use of order list extension for ACRL
17.7.2.5 Use of delta information extension for ACRL
17.7.2.6 Use of to be revoked extension for ACRL
42 17.7.2.7 Use of revoked group of certificates extension
43 17.7.2.8 Use of expired certificates on ACRL extension
17.7.3 Use of CRL entry extensions
17.7.3.1 Use of reason code extension
44 17.7.3.2 Use of hold instruction code extension
19.2.5 End-entity attribute certificate revocation list attribute type
20 Protocol support for public-key and privilege management infrastructures
20.1 General syntax
45 20.2 Wrapping of non-encrypted protocol data units
20.3 Wrapping of encrypted protocol data unit
20.3.1 Use of the Diffie-Hellman key agreement method
46 20.3.2 Encryption information syntax
20.3.3 Key agreement specification
47 20.3.4 Generation of keying material
20.3.5 Encryption encoding
48 20.4 Check of PKI-PMI-Wrapper protocol elements
20.4.1 General checking
20.4.2 Specific checking when not encrypting the wrapped PDU
49 20.4.3 Specific checking when encrypting the wrapped PDU
20.4.3.1 Checking of the key agreement specification
20.4.3.2 Checking of the encrypted PDU information
20.5 PKI-PMI-Wrapper error codes
50 21 Authorization and validation list management
21.3 Checking of received PDU
51 21.4 Authorization and validation management protocol
21.4.1 Authorization validation management introduction
21.4.2 Authorization validation management protocol common components
21.4.3 Public-key certificate management
52 21.4.4 Add authorization and validation list
54 21.4.4 Replace authorization and validation list
55 21.4.5 Delete authorization and validation list
56 21.4.6 Authorization and validation list reject
21.4.7 Authorization and validation list error codes
57 21.5 Certification authority subscription protocol
21.5.1 Certification authority subscription introduction
58 21.5.2 Certification authority subscription common components
21.5.3 Public-key certificate subscription
60 21.5.4 Public-key certificate un-subscription
61 21.5.5 Public-key certificate replacements
63 21.5.6 End-entity public-key certificate updates
64 21.5.7 Certification authority subscription reject
65 21.5.8 Certification authority subscription error codes
22 Trust broker protocol
85 C.1 certificate extension attribute concept
C.2 Formal specification for certificate extension attribute types
94 M.1 Scope
M.2 Basic directory concepts
M.3 Directory distinguished name and other name types
95 M.3 Subtrees
N.1 Introduction
96 N.2 One-way authentication
97 N.3 Two-way authentication
N.4 Three-way authentication
98 N.5 Five-way authentication (initiated by A)
99 N.6 Five-way authentication (initiated by B)
BSI 16/30336060 DC
$13.70