ГОСТ Р ИСО 17090-3—2010
Библиография
[1]ISO/IEC 2382-8:1998. Information technology — Vocabulary — Part 8: Security
[2] ISO 7498-2:1989. Information processing systems — Open Systems Interconnection — Basse Reference
Model — Part 2: Security Architecture
[3] ISO/IEC 8824-1:2002. Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic
notation
[4] ISO/IEC 9594-8:2001. Information technology — Open Systems Interconnection — The Directory: Public-key
and attribute certificate frameworks
[5] ISO/IEC 10181-1:1996. Information technology — Open Systems Interconnection — Security frameworks for
open systems: Overview
[6] ISO/IEC 13335-1, Information technology — Security techniques — Management of Information and
communications technology security — Part 1: Concepts and models for information and communications
technology secunty management
[7] ISO/IEC 14516. Information technology — Security techniques — Guidelines for the use and management of
Trusted Third Party services
[8] ISO/IEC 15945, Information technology — Security techniques — Specification of TTP services to support the
application digital signatures
[9]IETF/RFC 2510. Internet X.509 Public Key Infrastructure Certificate Management Protocols
[10]IETF/RFC 3280. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
[11]IETF/RFC 3739. Internet X.509 Public Key Infrastructure Qualified Certificates Profile
[12]U.S. government standard FIPS-140-2, level 1 and level 2
[13]ENV 13608-1. Health informatics — Security for healthcare communication — Concepts and terminology
[14]Ankey, R.. CertCo. Privilege Management Infrastructure. v0.4. August 24. 1999
[15]APEC Telecommunications Working Group. Business Facilitation Steering Group. Electronic Authentication Task
Group. PKI Interoperability Expert Group. Achieving PKI Interoperability. September. 1999
[16]Bemd B., Roger-France F. A Systemic Approach for Secure Health Information Systems. International Journal of
Medical Informatics. 2001, p. 51— 78
[17] Canadian Institute for Health Information. Model Digital Signature and Confidentiality Certificate Policies. June 30.
2001.
http://secure.c«hi.ca./cihiweb/dlspPage.jsp?cw_page
= mfostand_pki_e
[18]Drummond Group. The Healthkey Program. PKI In Healthcare. Recommendations and Guidelines for
Community-Based Tesbng. May 2000
[19] EESSI (European Electronic Signature Standardization Initatlve). Final Report of the EESSI Expert Team 20th
July 1999
[20]Feghhi. J. and Williams. P. Digital Certificates — Applied Internet Security. Addison-Wesley. 1998
[21]Government of Canada. Criteria for Cross Certification. 2000
[22]Klein. G., Lmdstrom. V.. Norr, A.. Ribbegard. G. and Torlof. P. Technical Aspects of PKI. January 2000
[23]Klein. G., Lmdstrom. V.. Norr. A.. Ribbegard. G.. Sonnergren. E. and Torlof. P. Infrastructure for Trust In Health
Informatics. January 2000
[24]SAA MP75 (Standards Australia). Strategies for the Implementation of a Public Key Authentication Framework
(PKAF) in Australia. 1996
[25]Wilson. S. Audit Based Public Key Infrastructure. Price Waterhouse Coopers White Paper. November 2000
27