{"id":255284,"date":"2024-10-19T16:52:30","date_gmt":"2024-10-19T16:52:30","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62351-112017\/"},"modified":"2024-10-25T12:19:20","modified_gmt":"2024-10-25T12:19:20","slug":"bs-en-62351-112017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62351-112017\/","title":{"rendered":"BS EN 62351-11:2017"},"content":{"rendered":"
IEC 62351-11:2016 specifies schema, procedures, and algorithms for securing XML documents that are used within the scope of the IEC as well as documents in other domains. This part is intended to be referenced by standards if secure exchanges are required, unless there is an agreement between parties in order to use other recognized secure exchange mechanisms. This part of IEC 62351 utilizes well-known W3C standards for XML document security and provides profiling of these standards and additional extensions.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 1 Scope Figures Figure 1 \u2013 Overview of IEC 62351-11 structure <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4 Security issues addressed by this document 4.1 General 4.2 Security threats countered 4.3 Attack methods countered 5 XML Documents <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Figure 2 \u2013 Data in transition example <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6 XML document encapsulation 6.1 General Figure 3 \u2013 Secure encapsulation for XML documents Figure 4 \u2013 General IEC\u00a062351-11 XSD layout <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.2 HeaderType Figure 5 \u2013 XSD ComplexType definition of HeaderType Tables Table 1 \u2013 Definitions of general structure for an IEC\u00a062351-11 document <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.3 Information 6.3.1 General Figure 6 \u2013 XSD ComplexType definition of information Table 2 \u2013 Definition of HeaderType Element <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.3.2 Nonce 6.3.3 AccessControl Figure 7 \u2013 XSD Complex Type Definition of AccessControl Table 3 \u2013 Definition of information element <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Figure 8 \u2013 XSD Complex Type definition of AccessControlType Table 4 \u2013 Definition of Contractual and ACL Element <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Figure 9 \u2013 XSD Complex Type Definition of ACLRestrictionType Table 5 \u2013 Definition of ACLRestrictionType Element <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Table 6 \u2013 Definition of Enumerated Values for ACLType Table 7 \u2013 Definition of Enumerated Values for Constraint <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Figure 10 \u2013 XSD Complex Type definition of EntityType Table 8 \u2013 Definition of EntityType Element <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Figure 11 \u2013 Example of AccessControl and XPATH <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.3.4 Body Figure 12 \u2013 Example of an IEC\u00a062351-11 Body with a CIM document <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.4 Encrypted element 6.4.1 General 6.4.2 EncryptionMethod Figure 13 \u2013 Structure of the IEC\u00a062351-11 Encrypted element Figure 14 \u2013 Structure of EncryptionMethodType <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.4.3 CipherData 6.4.4 KeyInfo Figure 15 \u2013 Structure of CipherDataType Figure 16 \u2013 EncryptedData element definition <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.5 SignatureType 6.5.1 General 6.5.2 SignedInfoType Figure 17 \u2013 W3C SignatureType definition <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Figure 18 \u2013 SignedInfotype XML structure Figure 19 \u2013 SignatureMethodType structure <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Figure 20 \u2013 ReferenceType structure <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Figure 21 \u2013 KeyInfoType Structure <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.6 Supporting XSD Types 6.6.1 General 6.6.2 NameSeqType 6.7 Security algorithm selection Figure 22 \u2013 Definition of NameSeqType <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7 Example files (informative) 7.1 Non-encrypted example <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.2 Encrypted example <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8 IANA list of signature, digest, and encryption methods (informative) <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Power systems management and associated information exchange. Data and communications security – Security for XML documents<\/b><\/p>\n |