Shopping Cart

No products in the cart.

BSI PD CEN ISO/TS 19299:2015

$215.11

Electronic fee collection. Security framework

Published By Publication Date Number of Pages
BSI 2015 154
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
4 Contents Page
5 European foreword
8 Foreword
9 Introduction
15 1 Scope
16 2 Normative references
18 3 Terms and definitions
23 4 Symbols and abbreviated terms
24 5 Trust model
5.1 Overview
5.2 Stakeholders trust relations
25 5.3 Technical trust model
5.3.1 General
5.3.2 Trust model for TC and TSP relations
27 5.3.3 Trust model for TSP and service user relations
5.3.4 Trust model for Interoperability Management relations
5.4 Implementation
5.4.1 Setup of trust relations
28 5.4.2 Trust relation renewal and revocation
5.4.3 Issuing and revocation of sub CA and end-entity certificates
29 5.4.4 Certificate and certificate revocation list profile and format
5.4.5 Certificate extensions
31 6 Security requirements
6.1 General
32 6.2 Information security management system
6.3 Communication interfaces
33 6.4 Data storage
6.5 Toll charger
35 6.6 Toll service provider
37 6.7 Interoperability Management
6.8 Limitation of requirements
38 7 Security measures — countermeasures
7.1 Overview
7.2 General security measures
39 7.3 Communication interfaces security measures
7.3.1 General
40 7.3.2 DSRC-EFC interface
41 7.3.3 CCC interface
42 7.3.4 LAC interface
7.3.5 Front End to TSP back end interface
43 7.3.6 TC to TSP interface
44 7.3.7 ICC interface
7.4 End-to-end security measures
46 7.5 Toll service provider security measures
7.5.1 Front end security measures
47 7.5.2 Back end security measures
48 7.6 Toll charger security measures
7.6.1 RSE security measures
7.6.2 Back end security measures
49 7.6.3 Other TC security measures
8 Security specifications for interoperable interface implementation
8.1 General
8.1.1 Subject
8.1.2 Signature and hash algorithms
50 8.2 Security specifications for DSRC-EFC
8.2.1 Subject
8.2.2 OBE
8.2.3 RSE
9 Key management
9.1 Overview
9.2 Asymmetric keys
9.2.1 Key exchange between stakeholders
51 9.2.2 Key generation and certification
9.2.3 Protection of keys
9.2.4 Application
52 9.3 Symmetric keys
9.3.1 General
9.3.2 Key exchange between stakeholders
53 9.3.3 Key lifecycle
54 9.3.4 Key storage and protection
55 9.3.5 Session keys
56 Annex A (normative) Security profiles
60 Annex B (normative) Implementation conformance statement (ICS) proforma
78 Annex C (informative) Stakeholder objectives and generic requirements
82 Annex D (informative) Threat analysis
138 Annex E (informative) Security policies
145 Annex F (informative) Example for an EETS security policy
147 Annex G (informative) Recommendations for privacy-focused implementation
149 Annex H (informative) Proposal for end-entity certificates
150 Bibliography
BSI PD CEN ISO/TS 19299:2015
$215.11