{"id":255284,"date":"2024-10-19T16:52:30","date_gmt":"2024-10-19T16:52:30","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62351-112017\/"},"modified":"2024-10-25T12:19:20","modified_gmt":"2024-10-25T12:19:20","slug":"bs-en-62351-112017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62351-112017\/","title":{"rendered":"BS EN 62351-11:2017"},"content":{"rendered":"

IEC 62351-11:2016 specifies schema, procedures, and algorithms for securing XML documents that are used within the scope of the IEC as well as documents in other domains. This part is intended to be referenced by standards if secure exchanges are required, unless there is an agreement between parties in order to use other recognized secure exchange mechanisms. This part of IEC 62351 utilizes well-known W3C standards for XML document security and provides profiling of these standards and additional extensions.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
6<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
8<\/td>\nFOREWORD <\/td>\n<\/tr>\n
10<\/td>\n1 Scope
Figures
Figure 1 \u2013 Overview of IEC 62351-11 structure <\/td>\n<\/tr>\n
11<\/td>\n2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
12<\/td>\n4 Security issues addressed by this document
4.1 General
4.2 Security threats countered
4.3 Attack methods countered
5 XML Documents <\/td>\n<\/tr>\n
13<\/td>\nFigure 2 \u2013 Data in transition example <\/td>\n<\/tr>\n
14<\/td>\n6 XML document encapsulation
6.1 General
Figure 3 \u2013 Secure encapsulation for XML documents
Figure 4 \u2013 General IEC\u00a062351-11 XSD layout <\/td>\n<\/tr>\n
15<\/td>\n6.2 HeaderType
Figure 5 \u2013 XSD ComplexType definition of HeaderType
Tables
Table 1 \u2013 Definitions of general structure for an IEC\u00a062351-11 document <\/td>\n<\/tr>\n
16<\/td>\n6.3 Information
6.3.1 General
Figure 6 \u2013 XSD ComplexType definition of information
Table 2 \u2013 Definition of HeaderType Element <\/td>\n<\/tr>\n
17<\/td>\n6.3.2 Nonce
6.3.3 AccessControl
Figure 7 \u2013 XSD Complex Type Definition of AccessControl
Table 3 \u2013 Definition of information element <\/td>\n<\/tr>\n
18<\/td>\nFigure 8 \u2013 XSD Complex Type definition of AccessControlType
Table 4 \u2013 Definition of Contractual and ACL Element <\/td>\n<\/tr>\n
19<\/td>\nFigure 9 \u2013 XSD Complex Type Definition of ACLRestrictionType
Table 5 \u2013 Definition of ACLRestrictionType Element <\/td>\n<\/tr>\n
20<\/td>\nTable 6 \u2013 Definition of Enumerated Values for ACLType
Table 7 \u2013 Definition of Enumerated Values for Constraint <\/td>\n<\/tr>\n
21<\/td>\nFigure 10 \u2013 XSD Complex Type definition of EntityType
Table 8 \u2013 Definition of EntityType Element <\/td>\n<\/tr>\n
23<\/td>\nFigure 11 \u2013 Example of AccessControl and XPATH <\/td>\n<\/tr>\n
24<\/td>\n6.3.4 Body
Figure 12 \u2013 Example of an IEC\u00a062351-11 Body with a CIM document <\/td>\n<\/tr>\n
25<\/td>\n6.4 Encrypted element
6.4.1 General
6.4.2 EncryptionMethod
Figure 13 \u2013 Structure of the IEC\u00a062351-11 Encrypted element
Figure 14 \u2013 Structure of EncryptionMethodType <\/td>\n<\/tr>\n
26<\/td>\n6.4.3 CipherData
6.4.4 KeyInfo
Figure 15 \u2013 Structure of CipherDataType
Figure 16 \u2013 EncryptedData element definition <\/td>\n<\/tr>\n
27<\/td>\n6.5 SignatureType
6.5.1 General
6.5.2 SignedInfoType
Figure 17 \u2013 W3C SignatureType definition <\/td>\n<\/tr>\n
28<\/td>\nFigure 18 \u2013 SignedInfotype XML structure
Figure 19 \u2013 SignatureMethodType structure <\/td>\n<\/tr>\n
29<\/td>\nFigure 20 \u2013 ReferenceType structure <\/td>\n<\/tr>\n
30<\/td>\nFigure 21 \u2013 KeyInfoType Structure <\/td>\n<\/tr>\n
31<\/td>\n6.6 Supporting XSD Types
6.6.1 General
6.6.2 NameSeqType
6.7 Security algorithm selection
Figure 22 \u2013 Definition of NameSeqType <\/td>\n<\/tr>\n
32<\/td>\n7 Example files (informative)
7.1 Non-encrypted example <\/td>\n<\/tr>\n
34<\/td>\n7.2 Encrypted example <\/td>\n<\/tr>\n
36<\/td>\n8 IANA list of signature, digest, and encryption methods (informative) <\/td>\n<\/tr>\n
41<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Power systems management and associated information exchange. Data and communications security – Security for XML documents<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2017<\/td>\n44<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":255290,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-255284","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/255284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/255290"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=255284"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=255284"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=255284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}