{"id":353045,"date":"2024-10-20T00:55:52","date_gmt":"2024-10-20T00:55:52","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-16-30336060-dc\/"},"modified":"2024-10-26T01:00:25","modified_gmt":"2024-10-26T01:00:25","slug":"bsi-16-30336060-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-16-30336060-dc\/","title":{"rendered":"BSI 16\/30336060 DC"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
5<\/td>\n6N16409
General
Summary
Introduction <\/td>\n<\/tr>\n
6<\/td>\n1 Scope <\/td>\n<\/tr>\n
7<\/td>\n2 Normative references
2.4 International Standards
2.45 Other references
3 Definitions
3.1 OSI Reference Model security architecture definitions
3.3 Directory model definitions <\/td>\n<\/tr>\n
8<\/td>\n3.5 Public-key and attribute certificate definitions <\/td>\n<\/tr>\n
12<\/td>\n4 Abbreviations <\/td>\n<\/tr>\n
13<\/td>\n5 Conventions <\/td>\n<\/tr>\n
14<\/td>\n6 Frameworks overview
6.3 Distinguished Encoding of Basic Encoding Rules
6.4 Applying Distinguished Encoding <\/td>\n<\/tr>\n
15<\/td>\n6.5 Using repositories
7 Public-keys and public-key certificates
7.1 Introduction
7.2 Public-key certificate <\/td>\n<\/tr>\n
16<\/td>\n7.3 Public-key certificate extensions
7.4 Types of public-key certificates <\/td>\n<\/tr>\n
17<\/td>\n7.6 Entity relationship
7.7 Certification path <\/td>\n<\/tr>\n
18<\/td>\n7.8 Generation of key pairs
7.10 Certificate revocation list
7.10.1 Certificate revocation list principles <\/td>\n<\/tr>\n
20<\/td>\n7.10.2 Certificate revocation list syntax <\/td>\n<\/tr>\n
21<\/td>\n7.12.2 Indirect CRL contents
8 Trust Models <\/td>\n<\/tr>\n
22<\/td>\n8.1 Three cornered model
8.2 Four cornered trust model <\/td>\n<\/tr>\n
23<\/td>\n9 Public-key certificate and CRL extensions
9.1 Policy handling
9.1.1 Certificate policy <\/td>\n<\/tr>\n
24<\/td>\n9.1.2 Cross-certificates
9.2.2 Public-key certificate and CRL extension fields
9.2.2.5 Private key usage period extension <\/td>\n<\/tr>\n
25<\/td>\n9.2.2.8 Authorization validation extension
9.5.2.1 CRL number extension
9.5.2.2 CRL scope extension
9.5.2.6 To be revoked extension <\/td>\n<\/tr>\n
27<\/td>\n9.5.2.7 Revoked group of certificates extension <\/td>\n<\/tr>\n
28<\/td>\n9.5.3.1 Reason code extensions
9.6 CRL distribution point and delta-CRL extension (old 8.6)
9.6.1 Requirements <\/td>\n<\/tr>\n
29<\/td>\n9.6.2 CRL distribution point and delta-CRL extension fields (old 8.6.2)
9.6.2.1 CRL distribution points extension <\/td>\n<\/tr>\n
30<\/td>\n9.6.2.2 Issuing distribution point extension
9.6.2.3 Certificate issuer extension
9.6.2.4 Delta CRL indicator extension <\/td>\n<\/tr>\n
31<\/td>\n9.6.2.6 Freshest CRL extension
9.6.2.7 AA issuing distribution point extension
11 Authorization and validation lists
11.1 Authorization and validation list concept <\/td>\n<\/tr>\n
32<\/td>\n11.2 The authorizer
11.3 Authorization and validation list syntax <\/td>\n<\/tr>\n
34<\/td>\n11.4 Authorization and validation restrictions
11.4.3 Protocol restrictions
12 Certification path processing procedure
12.2 Path processing outputs <\/td>\n<\/tr>\n
35<\/td>\n13.2.5 End-entity public-key certificate revocation list attribute type <\/td>\n<\/tr>\n
36<\/td>\n14 Attribute certificates
14.3 Attribute certificate revocation lists
14.3.1 Attribute certificate revocation list principles <\/td>\n<\/tr>\n
37<\/td>\n14.3.2 Attribute certificate revocation list syntax <\/td>\n<\/tr>\n
38<\/td>\n17.2.2.1 Use of CRL distribution points extension
17.2.2.2 AA issuing distribution point extension <\/td>\n<\/tr>\n
39<\/td>\n17.2.2.3 Use of certificate issuer extension
17.2.2.4 Use of delta CRL indicator extension <\/td>\n<\/tr>\n
40<\/td>\n17.2.2.5 Use of base update extension
17.2.2.6 Use of freshest CRL extension
17.7 Use of basic CRL extension for ACRLs
17.7.1 Requirements
17.7.2 Use of CRL extensions
17.7.2.1 Use of CRL number extension for ACRL
17.7.2.2 Use of Status referral extension for ACRL
17.7.2.3 Use of CRL stream identifier for ACRL
17.7.2.4 Use of order list extension for ACRL
17.7.2.5 Use of delta information extension for ACRL
17.7.2.6 Use of to be revoked extension for ACRL <\/td>\n<\/tr>\n
42<\/td>\n17.7.2.7 Use of revoked group of certificates extension <\/td>\n<\/tr>\n
43<\/td>\n17.7.2.8 Use of expired certificates on ACRL extension
17.7.3 Use of CRL entry extensions
17.7.3.1 Use of reason code extension <\/td>\n<\/tr>\n
44<\/td>\n17.7.3.2 Use of hold instruction code extension
19.2.5 End-entity attribute certificate revocation list attribute type
20 Protocol support for public-key and privilege management infrastructures
20.1 General syntax <\/td>\n<\/tr>\n
45<\/td>\n20.2 Wrapping of non-encrypted protocol data units
20.3 Wrapping of encrypted protocol data unit
20.3.1 Use of the Diffie-Hellman key agreement method <\/td>\n<\/tr>\n
46<\/td>\n20.3.2 Encryption information syntax
20.3.3 Key agreement specification <\/td>\n<\/tr>\n
47<\/td>\n20.3.4 Generation of keying material
20.3.5 Encryption encoding <\/td>\n<\/tr>\n
48<\/td>\n20.4 Check of PKI-PMI-Wrapper protocol elements
20.4.1 General checking
20.4.2 Specific checking when not encrypting the wrapped PDU <\/td>\n<\/tr>\n
49<\/td>\n20.4.3 Specific checking when encrypting the wrapped PDU
20.4.3.1 Checking of the key agreement specification
20.4.3.2 Checking of the encrypted PDU information
20.5 PKI-PMI-Wrapper error codes <\/td>\n<\/tr>\n
50<\/td>\n21 Authorization and validation list management
21.3 Checking of received PDU <\/td>\n<\/tr>\n
51<\/td>\n21.4 Authorization and validation management protocol
21.4.1 Authorization validation management introduction
21.4.2 Authorization validation management protocol common components
21.4.3 Public-key certificate management <\/td>\n<\/tr>\n
52<\/td>\n21.4.4 Add authorization and validation list <\/td>\n<\/tr>\n
54<\/td>\n21.4.4 Replace authorization and validation list <\/td>\n<\/tr>\n
55<\/td>\n21.4.5 Delete authorization and validation list <\/td>\n<\/tr>\n
56<\/td>\n21.4.6 Authorization and validation list reject
21.4.7 Authorization and validation list error codes <\/td>\n<\/tr>\n
57<\/td>\n21.5 Certification authority subscription protocol
21.5.1 Certification authority subscription introduction <\/td>\n<\/tr>\n
58<\/td>\n21.5.2 Certification authority subscription common components
21.5.3 Public-key certificate subscription <\/td>\n<\/tr>\n
60<\/td>\n21.5.4 Public-key certificate un-subscription <\/td>\n<\/tr>\n
61<\/td>\n21.5.5 Public-key certificate replacements <\/td>\n<\/tr>\n
63<\/td>\n21.5.6 End-entity public-key certificate updates <\/td>\n<\/tr>\n
64<\/td>\n21.5.7 Certification authority subscription reject <\/td>\n<\/tr>\n
65<\/td>\n21.5.8 Certification authority subscription error codes
22 Trust broker protocol <\/td>\n<\/tr>\n
85<\/td>\nC.1 certificate extension attribute concept
C.2 Formal specification for certificate extension attribute types <\/td>\n<\/tr>\n
94<\/td>\nM.1 Scope
M.2 Basic directory concepts
M.3 Directory distinguished name and other name types <\/td>\n<\/tr>\n
95<\/td>\nM.3 Subtrees
N.1 Introduction <\/td>\n<\/tr>\n
96<\/td>\nN.2 One-way authentication <\/td>\n<\/tr>\n
97<\/td>\nN.3 Two-way authentication
N.4 Three-way authentication <\/td>\n<\/tr>\n
98<\/td>\nN.5 Five-way authentication (initiated by A) <\/td>\n<\/tr>\n
99<\/td>\nN.6 Five-way authentication (initiated by B) <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 9594-8 AMD2. Information technology. Open Systems Interconnection. The Directory. Part 8. Public-key and attribute certificate frameworks<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2016<\/td>\n100<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":353051,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-353045","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/353045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/353051"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=353045"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=353045"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=353045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}