ГОСТ Р ИСО/ТС 17090-1— 2009
Библиография
[1]ISO/IEC 2382-8:1998. Information technology — Vocabulary — Part 8: Security
[2] ISO/IEC 8824-1:1998. Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic
notation — Part 1
[3] ISO/IEC 10181-1:1996. Information technology — Open Systems Interconnection — Security frameworks for
open systems: Overview
[4] ISO/IEC TR 13335-1, Information technology — Guidelines for the management of IT Security — Part 1: Concepts
and models for IT Security
[5] ISO/IEC 14516. Information technology — Security techniques — Guidelines for the use and management of
Trusted Third Party services
[6] ISO/IEC 15945. Information technology — Security techniques — Specification of TTP services to support the
application digital signatures
[7]ENV 13608-1. Health informatics — Security for healthcare communication — Concepts and terminology
[8]IETF/RFC 2459.Internet X.509 Public Key Infrastructure Certificate and CRL Profile
[9]IETF/RFC 2527, Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework
[101 IETF/RFC 3039. Internet X.509 Public Key Infrastructure Qualified Certificates Profile
[11]Ankey, R.. CertCo. Privilege Management Infrastructure. v0.4. August 24. 1999
[12]APEC Telecommunications Working Group. Business Facilitation Steering Group. Electronic Authentication
Task Group. PKI Interoperability Expert Group. Achieving PKI Interoperability. September. 1999
[13] ASTM Draft Standard. Standard Guide for Model Certification Practice Statement for Healthcare. January 2000
[14] Bernd B.. Roger-France F. A Systemic Approach for Secure Health Information Systems. International Journal of
Medical Informatics (2001). pp. 51 — 78
[15] Canadian Institute for Health Information. Model Digital Signature and Confidentiality Certificate Policies. June
30. 2001.
http://secure.dhi.ca-/cihiweb/
dispPage.jsp?cw_page=infostand_pki_e
[16] COBIT (Control Objectives for Information and Related Technologies) spedfication produced by the Information
Systems Audit and Control Foundation
[17] Drummond Group. The Healthkey Program, PKI in Healthcare: Recommendations and Guidelines for Community-
based Testing. May 2000
[18] EESSI European Electronic Signature Standardization Initiative (EESSI). Final Report of the EESSI Expert Team
20th July 1999
[19]Feghhi. J.. Feghhi. J. and Williams. P. Digital Certificates — Applied Internet Security. Addison-Wesley 1998
[20]Government of Canada. Criteria for Cross Certification, 2000
[21]Klein. G.. Lindstrom. V.. Norr. A., Ribbegard. G. and Torlof. P. Technical Aspects of PKI. January 2000
[22] Klein. G.. Lindstrom. V.. Norr. A.. Ribbegard. G.. Sonnergren. E. and Torlof. P. Infrastructure for Trust in Health
Informatics. January 2000
[23] Standards Australia. Strategies for the Implementation of a Public Key Authentication Framework (PKAF) in
Australia SAA MP75
[24]Wilson. S. Audit Based Public Key Infrastructure. Price Waterhouse Coopers White Paper. November 2000
[25]INTERNET-DRAFT October 1999 4.1. X.509 Attribute Certificate
27