OCF 2.3 RBSTG: Bridging Security Editorial Cleanup Sec WG CR Legal Disclaimer
|
|
- Hugh Sims
- 5 years ago
- Views:
Transcription
1 Template version: 1.2 page RBSTG: Bridging Security Editorial Cleanup Sec WG CR 2685 Legal Disclaimer THIS IS A DRAFT SPECIFICATION DOCUMENT ONLY AND HAS NOT BEEN ADOPTED BY THE OPEN CONNECTIVITY FOUNDATION. THIS DRAFT DOCUMENT MAY NOT BE RELIED UPON FOR ANY PURPOSE OTHER THAN REVIEW OF THE CURRENT STATE OF THE DEVELOPMENT OF THIS DRAFT DOCUMENT. THE OPEN CONNECTIVITY FOUNDATION AND ITS MEMBERS RESERVE THE RIGHT WITHOUT NOTICE TO YOU TO CHANGE ANY OR ALL PORTIONS HEREOF, DELETE PORTIONS HEREOF, MAKE ADDITIONS HERETO, DISCARD THIS DRAFT DOCUMENT IN ITS ENTIRETY OR OTHERWISE MODIFY THIS DRAFT DOCUMENT AT ANY TIME. YOU SHOULD NOT AND MAY NOT RELY UPON THIS DRAFT DOCUMENT IN ANY WAY, INCLUDING BUT NOT LIMITED TO THE DEVELOPMENT OF ANY PRODUCTS OR SERVICES. IMPLEMENTATION OF THIS DRAFT DOCUMENT IS DONE AT YOUR OWN RISK AMEND AND IT IS NOT SUBJECT TO ANY LICENSING GRANTS OR COMMITMENTS UNDER THE OPEN CONNECTIVITY FOUNDATION INTELLECTUAL PROPERTY RIGHTS POLICY OR OTHERWISE. IN CONSIDERATION OF THE OPEN CONNECTIVITY FOUNDATION GRANTING YOU ACCESS TO THIS DRAFT DOCUMENT, YOU DO HEREBY WAIVE ANY AND ALL CLAIMS ASSOCIATED HEREWITH INCLUDING BUT NOT LIMITED TO THOSE CLAIMS DISCUSSED BELOW, AS WELL AS CLAIMS OF DETRIMENTAL RELIANCE. The logo is a trademark of Open Connectivity Foundation, Inc. in the United States or other countries. *Other names and brands may be claimed as the property of others. Copyright 2018 Open Connectivity Foundation, Inc. All rights reserved. Copying or other form of reproduction and/or distribution of these works are strictly prohibited.
2 Template version: 1.2 page 2 **** Section 2 Normative References **** Z-Wave Plus Device Type Specification Specification.pdf Z-Wave Plus Role Type Specification Specification.pdf Zigbee , Zigbee Specification, August ****** Section 3.1 Terms and Definitions ****** 3.1.y Bridge Note 1 to entry: The details are defined in Bridging Specification. 3.1.X Bridging Platform Note 1 to entry: The details are defined in Bridging Specification ****** Section 3.2 Acronyms and Abbreviations ******
3 Template version: 1.2 page 3 Symbol Description AC Access Control ACE Access Control Entry ACL Access Control List AES Advanced Encryption Standard. See NIST FIPS 197, "Advanced Encryption Standard (AES)" AMS Access Management Service CMS Credential Management Service CRUDN CREATE, RETREIVE, UPDATE, DELETE, NOTIFY CSR Certificate Signing Request CVC Code Verification Certificate ECC Elliptic Curve Cryptography ECDSA Elliptic Curve Digital Signature Algorithm EKU Extended Key Usage EPC Embedded Platform Credential EPK Embedded Public Key DOTS Device Ownership Transfer Service DPKP Dynamic Public Key Pair ID Identity/Identifier JSON JavaScript Object Notation. See Core Specification. JWE JSON Web Encryption. See IETF RFC 7516, "JSON Web Encryption (JWE)" JWS JSON Web Signature. See IETF RFC 7515, "JSON Web Signature (JWS)" KDF Key Derivation Function MAC Message Authentication Code MITM Man-in-the-Middle NVRAM Non-Volatile Random-Access Memory OC Owner Credential OCSP Online Certificate Status OBT Onboarding Tool Open Connectivity Foundation. See Core Specification. OID Object Identifier OOB Out Of Band OTM Owner Transfer Method OWASP Open Web Application Security Project. See PE Policy Engine PIN Personal Identification Number PPSK PIN-authenticated pre-shared key PRF Pseudo Random Function PSI Persistent Storage Interface PSK Pre Shared Key RAML RESTful API Modeling Language. See Core Specification. RBAC Role Based Access Control RM Resource Manager RNG Random Number Generator SACL Signed Access Control List SBAC Subject Based Access Control SEE Secure Execution Environment SRM Secure Resource Manager SVR Security Resource SW Software
4 Template version: 1.2 page 4 UAID Unique Authenticable Identifier URI Uniform Resource Identifier. See Core Specification. VOD Device. See Bridging Specification Table 1 Acronyms and abbreviations ****** Section Z (introduced in CR 2595) ****** Z.1 Bridging Security Z.1.1 Universal Requirements for Bridging to another Ecosystem The Bridge shall go through ownership transfer as any other onboardee would. The software of an Bridge shall be field updatable. (This requirement need not be tested but can be certified via a vendor declaration.) Each VOD shall be onboarded by an OBT. Each Device should be provisioned as appropriate in the. In other words, VODs and Devices are treated the same way as physical Devices. They are entities that have to be provisioned in their network. Each VOD shall implement the behaviour required by the Core Specification and the Security Specification. Each VOD shall perform authentication, access control, and encryption according to the security settings it received from the OBT. Each Device shall implement the security requirements of the. In addition, in order to be considered secure from an perspective, the Bridge Platform shall use appropriate ecosystem-specific security options for communication between the Devices instantiated by the Bridge and Devices. This security shall include mutual authentication, and encryption and integrity protection of messages in the bridged ecosystem. A VOD may authenticate itself to the DOTS using the Manufacturer Certificate Based OTM (see section 7.3.6) with the Manufacturer Certificate and corresponding private key of the Bridge which instantiated that VOD. A VOD may authenticate itself to the Cloud (see Section ) using the Manufacturer Certificate and corresponding private key of the Bridge which instantiated that VOD.
5 Template version: 1.2 page 5 Z.1.2 Additional Security Requirements specific to s Z Additional Security Requirements specific to the AllJoyn For AllJoyn translator, an OBT shall be able to block the communication of all Devices with all Devices that don t communicate securely with the Bridge, by using the Bridge Device s oic.r.securemode Resource specified in the Bridging Specification. Z Additional Security Requirements specific to the Bluetooth LE An Bridge shall block the communication of all Devices with all Devices that Z Additional Security Requirements specific to the onem2m s The Bridge shall implement onem2m application access control as specified in the onem2m Security Specification. An Bridge shall block the communication of all Devices with all Devices that Z Additional Security Requirements specific to the U+ An Bridge shall block the communication of all Devices with all Devices that Z Additional Security Requirements specific to the Z-Wave An Bridge shall block the communication of all Devices with all Devices that Z Additional Security Requirements specific to the Zigbee An Bridge shall block the communication of all Devices with all Devices that
6 Template version: 1.2 page 6 ****** Change to Annex AAA.2 (BLE) ****** Figure 1 shows how communications in both ecosystems of -BLE Bridge Platform are secured by their own security. -BLE Bridge Platform BLE Bridging Function BLE GATT BLE BLE GATT Secured by Security (e.g. CoAP over DTLS) Secured by BLE GAP security mode (e.g. mode 1 level 3) Figure 1 Security in -BLE Bridge ****** Change to Annex AAA.5 (Z-Wave) ****** Figure 3 presents how and Z-Wave communicate based upon their own security. g in -Z-Wave rid Bridge nplatform B Za v e c tio n -W F u Z-Wave Z-Wave Z-Wave Secured by Security Secured by Z-Wave Security Class (S2 Unauthenticated or higher) Figure 2 Security between and Z-Wave
7 Template version: 1.2 page 7 ****** Change to Annex AAA.6 (Zigbee) ****** Figure 3 shows how communications in both ecosystems of -Zigbee Bridge Platform are secured by their own security. -Zigbee ebridge Platform n b Z ig c tio n g F u 3g in.0 rid B Zigbee 3.0 Zigbee 3.0 Zigbee 3.0 Secured by Security Secured by Zigbee 3.0 Security (nwksecuritylevel>0x04) Figure 3 Security for and Zigbee 3.0
OCF 2.0 Clarify 10 parts on Section 7 SecWG CR2473. Legal Disclaimer
Template version: 1.0 page 1 OCF 2.0 Clarify 10 parts on Section 7 SecWG CR2473 Legal Disclaimer THIS IS A DRAFT SPECIFICATION DOCUMENT ONLY AND HAS NOT BEEN ADOPTED BY THE OPEN CONNECTIVITY FOUNDATION.
More informationOCF Cleveland release Device Management SVR part security firmware update - Security WG CR Legal Disclaimer
Template version: 1.2 page 1 OCF Cleveland release Device Management SVR part security firmware update - Security WG CR 2453 Legal Disclaimer THIS IS A DRAFT SPECIFICATION DOCUMENT ONLY AND HAS NOT BEEN
More informationOCF Security Specification
OCF Security Specification VERSION 1.3.0 November 2017 CONTACT admin@openconnectivity.org Copyright Open Connectivity Foundation, Inc. 2016-2017. All Rights Reserved. 1 LEGAL DISCLAIMER 2 3 4 5 6 7 8 9
More informationOIC SECURITY SPECIFICATION V1.1.1
1 2 OIC SECURITY SPECIFICATION V1.1.1 Open Connectivity Foundation (OCF) admin@openconnectivity.org Copyright Open Connectivity Foundation, Inc. 2017. All rights Reserved 0 3 4 5 6 7 8 9 10 11 12 13 14
More informationOCF 2.0 Semantic Tagging ATG CR1970. Legal Disclaimer
Template version: 1.0 page 1 OCF 2.0 Semantic Tagging ATG CR1970 Legal Disclaimer THIS IS A DRAFT SPECIFICATION DOCUMENT ONLY AND HAS NOT BEEN ADOPTED BY THE OPEN CONNECTIVITY FOUNDATION. THIS DRAFT DOCUMENT
More informationOCF 2.0 Constrained Device Support OIC 1.1 Core Technology WG CR Legal Disclaimer
Template version: 1.2 page 1 OCF 2.0 Constrained Device Support OIC 1.1 Core Technology WG CR 2413 Legal Disclaimer THIS IS A DRAFT SPECIFICATION DOCUMENT ONLY AND HAS NOT BEEN ADOPTED BY THE OPEN CONNECTIVITY
More informationOCF Core Specification Extension
OCF Core Specification Extension OCF Cloud VERSION 2.0 March 2018 CONTACT admin@openconnectivity.org Copyright Open Connectivity Foundation, Inc. 2018. All Rights Reserved. 2 3 4 5 6 7 8 9 10 11 12 13
More informationOCF 2.0 Clarify OCF CPLAttributes Extension, Section X, add Security OIDs, remove credid, update security profiles - Security WG CR 2529/2549
Template version: 1.2 page 1 OCF 2.0 Clarify OCF CPLAttributes Extension, Section 9.3.2.1.X, add Security OIDs, remove credid, update security profiles - Security WG CR 2529/2549 Legal Disclaimer THIS
More informationOCF 2.3 New Resources for Gas Consumption DMWG CR Legal Disclaimer
Template version: 1.2 page 1 OCF 2.3 New Resources for Gas Consumption DMWG CR 2675 Legal Disclaimer THIS IS A DRAFT SPECIFICATION DOCUMENT ONLY AND HAS NOT BEEN ADOPTED BY THE OPEN CONNECTIVITY FOUNDATION.
More informationThe Open Protocol for Access Control Identification and Ticketing with PrivacY
The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY
More informationInternet Engineering Task Force (IETF) ISSN: January Suite B Profile for Transport Layer Security (TLS)
Internet Engineering Task Force (IETF) M. Salter Request for Comments: 6460 National Security Agency Obsoletes: 5430 R. Housley Category: Informational Vigil Security ISSN: 2070-1721 January 2012 Abstract
More informationAN12120 A71CH for electronic anticounterfeit protection
Document information Info Keywords Abstract Content Security IC, IoT, Product support package, Secure cloud connection, Anti-counterfeit, Cryptographic authentication. This document describes how the A71CH
More informationPKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore
PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even
More informationIoTivity Big Picture. MyeongGi Jeong Software R&D Center
IoTivity Big Picture MyeongGi Jeong 2016.11.17 Software R&D Center Contents Overview Features Messaging Security Service Q&A Copyright c 2016 SAMSUNG ELECTRONICS. ALL RIGHTS RESERVED Overview IoTivity?
More informationIoTivity: The Open Connectivity Foundation and the IoT Challenge
IoTivity: The Open Connectivity Foundation and the IoT Challenge Thiago Macieira Embedded Linux Conference / Open IoT Summit Berlin, October 2016 Who am I? 2 3 About the Open Connectivity Foundation 4
More informationECMA-409. NFC-SEC-02: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM. 2 nd Edition / June Reference number ECMA-123:2009
ECMA-409 2 nd Edition / June 2015 NFC-SEC-02: NFC-SEC Cryptography Standard using ECDH-256 and AES-GCM Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International
More informationDIGITALSIGN - CERTIFICADORA DIGITAL, SA.
DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS
More informationApple Inc. Certification Authority Certification Practice Statement
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective
More informationThis Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification.
This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification. The present document has not been subject to any approval
More informationDocument Number Document Name: Date: Abstract:
Document Number Document Name: Date: Abstract: ONEM2M TECHNICAL SPECIFICATION TS-0024-V2.0.0 OIC Interworking 2016-August-30 This document specifies the onem2m and OIC Interworking Template Version: 08
More informationEncrypted Object Extension
Encrypted Object Extension ABSTRACT: "Publication of this Working Draft for review and comment has been approved by the Cloud Storage Technical Working Group. This draft represents a "best effort" attempt
More information1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)
To: INCITS Technical Committee T10 From: David L. Black, EMC Email: black_david@emc.com Date: October 29, 2008 Subject: SPC-4: Digital Signature Authentication (08-423r0) 1) Revision history Revision 0
More informationPKCS #15: Conformance Profile Specification
Table of Contents PKCS #15: Conformance Profile Specification RSA Laboratories August 1, 2000 1 INTRODUCTION... 2 1 REFERENCES AND RELATED DOCUMENTS... 2 2 DEFINITIONS... 2 3 SYMBOLS AND ABBREVIATIONS...
More informationETSI GS MEC 016 V1.1.1 ( )
GS MEC 016 V1.1.1 (2017-09) GROUP SPECIFICATION Mobile Edge Computing (MEC); UE application interface Disclaimer The present document has been produced and approved by the Mobile Edge Computing (MEC) Industry
More informationIntended status: Standards Track January 13, 2015 Expires: July 17, 2015
JOSE Working Group M. Jones Internet-Draft Microsoft Intended status: Standards Track January 13, 2015 Expires: July 17, 2015 Abstract JSON Web Algorithms (JWA) draft-ietf-jose-json-web-algorithms-40 The
More informationONEM2M TECHNICAL SPECIFICATION
Document Number Document Name: ONEM2M TECHNICAL SPECIFICATION TS-0008- V-1.3.2 CoAP Protocol Binding Date: Abstract: 2016-February-29 The specification will cover the protocol specific part of communication
More informationSecurity Association Creation
1 Security Association Creation David L. Black November 2006 2 The Big Picture: Three Proposals Framework: 06-369 specifies Security Associations (SAs) Connect key generation to key usage (and identify
More informationAugust, Actividentity CTO Office
The Open Protocol for Access Control Identification and Ticketing with PrivacY For the Secure Enablement of converged Access and Contactless Transactions August, 2010 Actividentity CTO Office 2 What is
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationProvisioning IoT with Web NFC. Zoltan Kis Intel
Provisioning IoT with Web NFC Zoltan Kis (@zolkis), Intel Background JavaScript APIs for IoTivity, Soletta W3C Web NFC editor Web access to hardware Earlier: Network management (DSL) Mesh radio networks
More informationONEM2M TECHNICAL SPECIFICATION
Document Number Document Name: ONEM2M TECHNICAL SPECIFICATION TS-0011-V2.4.1 Common Terminology Date: Abstract: 2016-August-30 This TS contains a collection of specific technical terms (definitions and
More informationApple Inc. Certification Authority Certification Practice Statement
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective
More informationApple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...
More informationENVIRONMENTAL SENSING PROFILE
ENVIRONMENTAL SENSING PROFILE Bluetooth Profile Specification Date 2014-Nov-18 Revision Group Prepared By SFWG Feedback Email sf-main@bluetooth.org Abstract: This profile enables a Collector device to
More informationETSI TS V ( )
TS 129 222 V15.0.0 (2018-07) TECHNICAL SPECIFICATION 5G; Common API Framework for 3GPP Northbound APIs (3GPP TS 29.222 version 15.0.0 Release 15) 1 TS 129 222 V15.0.0 (2018-07) Reference DTS/TSGC-0329222vf00
More informationOverview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv!
Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv! ACME Overview! ACME is a protocol being developed in IETF for Automated Certificate Management.!
More informationInternet Engineering Task Force (IETF) Request for Comments: 7518 Category: Standards Track May 2015 ISSN:
Internet Engineering Task Force (IETF) M. Jones Request for Comments: 7518 Microsoft Category: Standards Track May 2015 ISSN: 2070-1721 Abstract JSON Web Algorithms (JWA) This specification registers cryptographic
More information1 scons --debug=explain VERBOSE=true RELEASE=false TARGET_TRANSPORT=IP DRAFT
1 scons --debug=explain VERBOSE=true RELEASE=false TARGET_TRANSPORT=IP 2 BUILD_SAMPLE=ON 3 OCF CORE SPECIFICATION V1.0.0 Part 1 Open Connectivity Foundation (OCF) admin@openconnectivity.org Copyright Open
More informationDevice Provisioning Protocol Specification
Device Provisioning Protocol Specification Version 1.0 WI-FI ALLIANCE PROPRIETARY SUBJECT TO CHANGE WITHOUT NOTICE This document may be used with the permission of Wi-Fi Alliance under the terms set forth
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory: Procedures for distributed operation
INTERNATIONAL STANDARD ISO/IEC 9594-4 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Procedures for distributed operation Technologies de l'information Interconnexion
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information
More informationFIPS Security Policy
FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided
More informationCertification Report
Certification Report EAL 4+ Evaluation of Version 2.6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationETSI TS V1.1.1 ( )
TS 103 096-1 V1.1.1 (2013-07) Technical Specification Intelligent Transport Systems (ITS); Testing; Conformance test specification for TS 102 867 and TS 102 941; Part 1: Protocol Implementation Conformance
More informationonem2m-ts-0008-coap Protocol Binding-V CoAP Protocol Binding Technical Specification
1 2 3 Document Number Document Name: O NEM2M T ECHNICAL SPECIFICATION onem2m-ts-0008-coap Protocol Binding-V-0.5.0 CoAP Protocol Binding Technical Specification Date: 2014-08-01 Abstract: The specification
More informationInformation technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
INTERNATIONAL STANDARD ISO/IEC 18367 First edition 2016-12-15 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing Technologie de l information
More informationWireless Innovation Forum Contribution
[WINNF-IN-00] 0 0 Wireless Innovation Forum Contribution Committee: SSC WG CBSD Task Group Title: WInnForum CBSD/DP UUT Security Test Cases Tutorial Short Title: WInnForum CBSD/DP UUT Security Test Cases
More informationDraft ETSI EN V ( )
Draft EN 319 412-2 V2.0.15 (2015-06) EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Certificate Profiles; Part 2: Certificate profile for certificates issued to natural persons 2 Draft
More informationETSI GS MEC 014 V1.1.1 ( )
GS MEC 014 V1.1.1 (2018-02) GROUP SPECIFICATION Mobile Edge Computing (MEC); UE Identity API Disclaimer The present document has been produced and approved by the Mobile Edge Computing (MEC) Industry Specification
More informationDCCKI Interface Design Specification. and. DCCKI Repository Interface Design Specification
DCCKI Interface Design Specification and DCCKI Repository Interface Design Specification 1 INTRODUCTION Document Purpose 1.1 Pursuant to Section L13.13 of the Code (DCCKI Interface Design Specification),
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 13157-2 First edition 2010-05-01 Information technology Telecommunications and information exchange between systems NFC Security Part 2: NFC-SEC cryptography standard using
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationInternet Engineering Task Force (IETF) Request for Comments: 5754 Updates: 3370 January 2010 Category: Standards Track ISSN:
Internet Engineering Task Force (IETF) S. Turner Request for Comments: 5754 IECA Updates: 3370 January 2010 Category: Standards Track ISSN: 2070-1721 Abstract Using SHA2 Algorithms with Cryptographic Message
More informationTECHNICAL SPECIFICATION
TECHNICAL SPECIFICATION IEC/TS 62351-5 Edition 2.0 2013-04 Power systems management and associated information exchange Data and communications security Part 5: Security for IEC 60870-5 and derivatives
More informationRUNNING SPEED AND CADENCE SERVICE
Date / Year-Month-Day Approved Revision Document No BLUETOOTH DOC 2012-08-07 Adopted V10 RSCS_SPEC Prepared By E-mail Address N.B. Sports and Fitness WG sf-main@bluetooth.org RUNNING SPEED AND CADENCE
More informationOCF Core Specifiation
OCF Core Specifiation VERSION 1.1.0 June 2017 Part 1 CONTACT admin@openconnectivity.org Copyright Open Connectivity Foundation, Inc. 2016-2017. All Rights Reserved. 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
More informationISO/IEC Information technology Common Biometric Exchange Formats Framework Security block format specifications
INTERNATIONAL STANDARD ISO/IEC 19785-4 First edition 2010-08-15 Information technology Common Biometric Exchange Formats Framework Part 4: Security block format specifications Technologies de l'information
More informationFIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2
Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level
More informationETSI TS V ( )
TS 133 234 V14.0.0 (2017-04) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; 3G security; Wireless Local Area Network (WLAN) interworking security (3GPP TS 33.234 version
More informationWiMAX Forum Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic
0 0 Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic WMF Approved 0-0- WMF-T-0-v0 0 Proprietary Copyright 0. All Rights Reserved. WiMAX FORUM PROPRIETARY WMF-T-0-v0 0 0 0 0 0 Copyright
More informationETSI TS V7.0.0 ( ) Technical Specification. Smart Cards; Extensible Authentication Protocol support in the UICC (Release 7)
TS 102 310 V7.0.0 (2008-09) Technical Specification Smart Cards; Extensible Authentication Protocol support in the UICC (Release 7) 2 TS 102 310 V7.0.0 (2008-09) Reference RTS/SCP-T0013v700 Keywords card,
More informationBluetooth low energy security, how good is it? Petter Myhre Bluetooth World, San Jose March 2017
Bluetooth low energy security, how good is it? Petter Myhre Bluetooth World, San Jose March 2017 Common Types of Attack Man-In-The-Middle Passive Eavesdropping Man-in-the-Middle (MITM) attack Active eavesdropping
More informationDelegated Access Control Extension
Delegated Access Control Extension Version 1.1f "Publication of this Working Draft for review and comment has been approved by the Cloud Storage Technical Working Group. This draft represents a "best effort"
More informationCredential Management for Internet of Things Devices
Credential Management for Internet of Things Devices Internet Protocol for Smart Objects (IPSO) Alliance Editors: Hannes Tschofenig, ARM Limited Ned Smith, Intel Contributors: Mark Baugher, Consultant
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-8 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 8: frameworks
More informationSummary of Updates CPS Revision 7 (Amendment from CPS Revision 6) 15 June 2018
Summary of Updates CPS Revision 7 (Amendment from CPS Revision 6) 15 June 2018 Section CPS Revision 6 CPS Revision 7 Reasoning / Notes 1.4.2 Prohibited certificate uses: 1.4.2 Prohibited certificate uses:
More informationApple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Table of Contents 1. Introduction... 5 1.1. Trademarks... 5
More informationETSI TS V ( )
TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; Presentation layer for 3GPP services () 1 Reference RTS/TSGS-0426307vf00 Keywords LTE,UMTS 650 Route des Lucioles F-06921
More informationTELIA MOBILE ID CERTIFICATE
Telia Mobile ID Certificate CPS v2.3 1 (56) TELIA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.3 Valid from June 30, 2017 Telia Mobile ID
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information
More informationNEXT DST CHANGE SERVICE
BLUETOOTH DOC Date / Year-Month-Day Approved Revision Document No 2011-09-15 Adopted V10r00 NDCS_SPEC Prepared By E-mail Address N.B. PUID WG rd-feedback@bluetooth.org NEXT DST CHANGE SERVICE Abstract:
More informationONEM2M TECHNICAL SPECIFICATION
Document Number Document Name: ONEM2M TECHNICAL SPECIFICATION onem2m TS 0003 Security_Solutions V 2014 08 onem2m Security Solutions Date: 2014 08 01 Abstract: Specification of onem2m security solutions.
More informationCI Plus ECP Specification v1.0 ( )
Technical Specification CI Plus Specification. Enhanced Content Protection. 2 CI Plus LLP 31 Chertsey Street, Guildford, Surrey, GU1 4HD, UK A company registered in England and Wales Registered Number:
More informationETSI GS MEC 026 V2.1.1 ( )
GS MEC 026 V2.1.1 (2018-09) GROUP SPECIFICATION Multi-access Edge Computing (MEC); Support for regulatory requirements Disclaimer: This DRAFT is a working document of ISG MEC. It is provided for information
More informationETSI TS V1.2.1 ( ) Technical Specification
TS 102 778-3 V1.2.1 (2010-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 3: PAdES Enhanced - PAdES-BES and PAdES-EPES Profiles
More informationJSON Web Algorithms (JWA) draft-ietf-jose-json-web-algorithms-01
JOSE Working Group M. Jones Internet-Draft Microsoft Intended status: Standards Track March 12, 2012 Expires: September 13, 2012 JSON Web Algorithms (JWA) draft-ietf-jose-json-web-s-01 Abstract The JSON
More informationONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017
ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM 12 July 2017 Time Isolated Aggregated Massively Connected Cloud / Data Centres Rich Devices / Gateways Constrained Devices The architecture will need to achieve
More informationThis Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification.
Document Number Document Name: ONEM2M TECHNICAL SPECIFICATION TS-0014-V2.0.1 Interworking Date: 2018-03-12 Abstract: The present document specifies the interworking capabilities of the M2M Service Layer
More informationSONERA MOBILE ID CERTIFICATE
Sonera Mobile ID Certificate CPS v2.1 1 (56) SONERA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.1 Valid from, domicile: Helsinki, Teollisuuskatu
More informationInternet Engineering Task Force (IETF) Request for Comments: 7192 Category: Standards Track April 2014 ISSN:
Internet Engineering Task Force (IETF) S. Turner Request for Comments: 7192 IECA Category: Standards Track April 2014 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Key Package
More informationInternet Engineering Task Force (IETF) Request for Comments: 6160 Category: Standards Track April 2011 ISSN:
Internet Engineering Task Force (IETF) S. Turner Request for Comments: 6160 IECA Category: Standards Track April 2011 ISSN: 2070-1721 Abstract Algorithms for Cryptographic Message Syntax (CMS) Protection
More informationCertification Report
Certification Report EAL 4+ Evaluation of JUNOS-FIPS for SRX Series version 10.4R4 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
More informationQPP Proprietary Profile Guide
Rev. 04 April 2018 Application note Document information Info Content Keywords Proprietary Profile, Server, Client Abstract The Proprietary Profile is used to transfer the raw data between BLE devices.
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology
INTERNATIONAL STANDARD ISO/IEC 21000-21 First edition 2013-07-01 Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology Technologies de l'information Cadre multimédia (MPEG-21)
More informationSSL Certificates Certificate Policy (CP)
SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full
More informationWorksheet for the Application Software
Worksheet for the Application Software Security Functional Requirements FCS_RBG_EXT1 Random Bit Generation Services FCS_RBG_EXT11 for its cryptographic operations FCS_RBG_EXT21 perform all deterministic
More informationISO INTERNATIONAL STANDARD. Health informatics Harmonized data types for information interchange
INTERNATIONAL STANDARD ISO 21090 First edition 2011-02-15 Health informatics Harmonized data types for information interchange Informatique de santé Types de données harmonisées pour une interchangeabilité
More informationUnionPay QuickPass Terminal Product Certification Rules
Document No.: UPCA--02V.0 PU UnionPay QuickPass Terminal Product Certification Rules Issued on July, 205 Implemented from July, 205 Issued by China UnionPay Co., Ltd. UnionPay QuickPass Terminal Product
More informationSeagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy
Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 November 12, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction...
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information
More informationPower of open source communities to onem2m
ETSI M2M Workshop 2015 featuring onem2m Power of open source communities to onem2m Prof. Song JaeSeung (jssong@sejong.ac.kr) Sejong University & KETI 11. December, 2015 1 Introduction to open source 2
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation
More informationETSI GS ZSM 006 V1.1.1 ( )
GS ZSM 006 V1.1.1 (2018-05) GROUP SPECIFICATION Zero touch network and Service Management (ZSM); Proof of Concept Framework Disclaimer The present document has been produced and approved by the Zero touch
More informationUsing EAP-TLS with TLS 1.3 draft-mattsson-eap-tls IETF 101, EMU, MAR John Mattsson, MOHIT sethi
Using EAP-TLS with TLS 1.3 draft-mattsson-eap-tls13-02 IETF 101, EMU, MAR 19 2018 John Mattsson, MOHIT sethi draft-mattsson-eap-tls13 EAP-TLS is widely supported for authentication in Wi-Fi. EAP-TLS is
More informationHypori Virtual Mobile Infrastructure Platform Android Cloud Environment Client Common Criteria Assurance Activities Report
Hypori Virtual Mobile Infrastructure Platform 3.1.0 Android Cloud Environment Client Common Criteria Assurance Activities Report Version 1.0, February 17, 2016 Prepared by: Leidos Inc. (formerly Science
More informationPolicy for Certification of Private Label Products Within the Cradle to Cradle Certified Certification Scheme. Version 1.0.
Policy for Certification of Private Label Products Within the Cradle to Cradle Certified Certification Scheme Version 1.0 March 2015 Copyright, Cradle to Cradle Products Innovation Institute, 2015 Cradle
More informationETSI TS V ( )
TS 132 509 V15.0.0 (2018-07) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Data
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9834-8 Second edition 2008-12-15 Information technology Open Systems Interconnection Procedures for the operation
More information