{"id":350160,"date":"2024-10-20T00:40:44","date_gmt":"2024-10-20T00:40:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-4192312019\/"},"modified":"2024-10-26T00:25:51","modified_gmt":"2024-10-26T00:25:51","slug":"bs-en-4192312019","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-4192312019\/","title":{"rendered":"BS EN 419231:2019"},"content":{"rendered":"
This document specifies a protection profile for trustworthy systems supporting time stamping.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | 1 Scope 2 Normative references 3 Terms, definitions and abbreviations 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.2 Abbreviations <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4 Introduction 4.1 PP reference 4.2 TOE overview 4.2.1 TOE type 4.2.2 TOE usage and major security features <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4.2.3 TOE Environment general overview <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4.2.4 Required non-TOE hardware\/software\/firmware <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5 Conformance claims 5.1 CC conformance claim 5.2 PP claim 5.3 Conformance rationale 5.4 Conformance statement <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6 Security problem definition 6.1 TOE assets <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.2 Threats 6.2.1 General <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.2.2 Relation between threats and assets <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.3 Organizational security policies <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.4 Assumptions <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7 Security objectives 7.1 General 7.2 Security objectives for the TOE <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.3 Security objectives for the operational environment <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.4 Security objectives rationale <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 8 Security functional requirements 8.1 General 8.2 Subjects, objects, operations and security attributes 8.2.1 Subjects <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 8.2.2 Objects 8.2.3 Operations 8.2.4 Security attributes 8.2.4.1 General 8.2.4.2 OB.CONTEXT <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 8.2.4.3 OB.TIMESTAMP_TOKEN 8.2.4.4 OB.TIMESTAMP_REQUEST 8.2.4.5 OB.PUB_KEY <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.2.4.6 OB.PRIV_KEY 8.2.4.7 OB. DATE_AND_TIME 8.3 Security requirements operations 8.4 User Data Protection (FDP) <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 8.5 Security Management (FMT) <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 8.6 Protection of the TSF (FPT) 8.7 Trusted Path\/Channels (FTP) <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 8.8 Cryptographic Support (FCS) <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 8.9 Identification and Authentication (FIA) 8.10 Security Audit (FAU) <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 9 Security assurance requirements <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 10 Security requirements rationale 10.1 Security functional requirements rationale 10.1.1 SFR dependencies rationale <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 10.1.2 SFR vs TOE security objectives rationale <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 10.2 Security assurance requirements rationale 10.2.1 General 10.2.2 Assurance level table <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 10.2.3 EAL rationale <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Protection profile for trustworthy systems supporting time stamping<\/b><\/p>\n |