magnifying icon Basket
1 item ^

Basket is empty
Login

Login

LOGGED AS

Help

Satisfaction enquiry

SATISFACTION ENQUIRY

Newsletter

Free of charge lifelong learning "Standardization"

FREE OF CHARGE LIFELONG LEARNING "STANDARDIZATION"

Standardisation

Draft standards in public enquiry

DRAFT STANDARDS IN PUBLIC ENQUIRY

Standards organizations

STANDARDS ORGANIZATIONS

  • National standards

  • European standards

  • International standards


Deliverable

 
Free preview
Price
Language
 
CEN/TS 419241:2014 Edition 03/2014
Security Requirements for Trustworthy Systems Supporting Server Signing
  •   
  •  
  • 36.2 / copy
  •  
 

Abstract

1.1 General This document specifies security requirements and recommendations for Trustworthy System Supporting Server Signing (TW4S) that generate advanced electronic signatures as defined in Directive 1999/93/EC. This document may also be applied to electronic signatures complying to Article 5(1) of Directive 1999/93/EC employing a Secure Signature Creation Device (SSCD) compliant with Annex III and supported by a qualified electronic signature. The Server Signing Application (SSA) runs on a networked server supporting one or more signatories to remotely sign electronic documents using centralized signature keys held on the signing server under sole control of the signatory. An SSA is intended to deliver to the user or to some other application process in a form specified by the user, an Advanced- or where applicable a Qualified - Electronic Signature associated with a Signer's Document as a Signed Data Object. This document: - provides commonly recognized functional models of TW4S; - specifies overall requirements that apply across all of the services identified in the functional model; - specifies security requirements for each of the services identified in the SSA. - specifies security requirements for sensitive system components which may be used by the SSA (e.g. Signature Creation Device (SCDev)). This document does not specify technologies and protocols, but rather identifies requirements on the security on technologies to be employed. 1.2 Out of scope The following aspects are considered to be out of scope: - other trusted services that may be used alongside this service such as signature validation service, time-stamping service and information preservation service, - any application or system outside of the SSA, - the legal interpretation of any form of signature (e.g. the implications of countersignatures, of multiple signatures and of signatures covering complex information structures containing other signatures). 1.3 Audience This document specifies security requirements that are intended to be followed by: - providers of SSA systems. - Trust Service Providers (TSP) offering signature generation service.

Status

Standard - Superseded

Origin

Technical Committee :
CEN/TC 224 : Personal identification, electronic signature and cards and their related systems and operations

Implementation

start of the vote on the project      date of ratification (dor)    14/10/2013
end of the vote on the project      date of anouncement (doa)    30/06/2014
start of the vote on the final project    13/06/2013   date of publication (dop)   
end of the vote on the final project    13/09/2013   date of withdrawal (dow)   


Publication Official Journal
of the Grand-Duchy of Luxembourg
06/05/2014
Reference

Relations

Evolutions
ILNAS-EN 419241-1:2018

International Classification for Standards (ICS codes) :

35.240.99 : IT applications in other fields

magnifying icon Basket
1 item ^

Basket is empty


Warning:
DIN standards can be downloaded only once! After downloading, they are no longer available in the eLibrary.
Begin download?