ISO 24760 PDF

ISO/IEC /FDAmd 1. Additional terminology and concepts. General information. Status: Deleted. Edition: 1. Number of pages: Technical. ISO/IEC •defines terms for identity management, and •specifies core concepts of identity and identity management and their relationships. Aug 1, ISO/IEC consists of the following parts, under the general title Information technology — Security techniques — A framework for identity.

Author: Vurn Vulkree
Country: Benin
Language: English (Spanish)
Genre: Science
Published (Last): 5 January 2009
Pages: 294
PDF File Size: 9.73 Mb
ePub File Size: 10.56 Mb
ISBN: 135-5-93119-432-3
Downloads: 91792
Price: Free* [*Free Regsitration Required]
Uploader: Douzilkree

Specifies six methods for authenticated encryption with sio security objectives of: Hi Doug, funny that I should come across your blog first when looking into advice onto adhering to this standard.

ISO/IEC JTC 1/SC 27

From Wikipedia, the free encyclopedia. These were among the reasons that a nmber of key countries voted against this standard.

Views Read Edit View history. This includes generic methods, techniques and guidelines to address both security and privacy aspects, such as: They are inconsistent in their use of other terms defined in the standard. Enter your email address to subscribe to this blog and receive notifications of new posts by email.

ISO/IEC /FDAmd 1 – Additional terminology and concepts

Defines a privacy architecture framework that: Information technology — Security techniques — Information security management systems — Requirements. Information technology – Security techniques – A framework for identity management – Part 2: Specifies the subjects to be addressed during the security evaluation of a biometric system [23]. Provides guidance for the handling of digital evidence that could be of evidential value [27].

  DTK DP4P PDF

Unfortunately it was adopted. Describes the concepts and principles of ICT readiness for business continuity and the method and framework needed to identify aspects in which to improve it.

Identity management and privacy technologies.

Notify me of new posts via email. This page was last edited on 6 Marchat Information technology — Security techniques — A framework for identity management — Part 1: In short, avoid this standard. This standard is supposed 224760 define key terms for identity management and specify core concepts in identity and identity management.

Create a free website or blog at WordPress.

Hi Doug, I was wondering whether you ever got around to sharing other standards and resources that do a better job of describing the concepts and terminology around identity.

Introduction and general model. I couldn’t agree more with everything in it!

My view is that it should be avoided. The section on concepts is if anything, even more problematic. Specifies the structure and data elements of Authentication Context for Biometrics ACBiowhich checks the validity of biometric verification process results [30].

Latest Tweets Nice ixo on jso concerns with modelling. The focus of each working group is described in lso group’s terms of reference.

In many cases they use terms that are just as unclear as the one they are trying to define e. Doug Newdick’s Blog The discourse between business and technology. Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems. The concepts slip from being descriptive this is what the concept means to being normative this is how a system should behave.

  BONSAI TECHNIQUES 2 JOHN NAKA PDF

Fill in your details below or click an icon to log in: Provides a framework for the secure and reliable management of identities by: It is entirely ICT focused though at other times it claims otherwise which is unhelpful in the context of a general framework for identity.

ISO/IEC JTC 1/SC 27 – Wikipedia

isoo Posted on February 10, at 9: The reasons for this are many: Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence. Specifies the requirements for establishing, implementing, monitoring, and maintaining documented a documented ISMS within an organization.

You are commenting using your WordPress. Email required Address never made public.

There are other ones out there which do a better job of describing the key concepts of identity and identity management. Provides guidelines for the implementation of systems for the management of identity information and specifies requirements for the implementation and operation of a framework io identity management. Standardization activity by this subcommittee includes general methods, management system requirements, techniques and guidelines to address both information security and privacy.