ГОСТ Р ИСО 17090-1—2015
Библиография
[1]ISO/IEC 2382-8:1998. Information technology — Vocabulary — Part 8: Security
[2]ISO/IEC 8824-1:2008, Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic
notation — Part 1
[3]ISO/IEC 10181-1:1996. Information technology — Open Systems Interconnection — Secunty frameworks for
open systems: Overview — Pari 1
[4]ISO/IEC 13335-1, Information technology — Guidelines for the management of IT Security — Part 1: Concepts
and models for IT Security
[5]ISO 7498-2:1989. Information processing systems— Open Systems Interconnection — Basic Reference
Model — Part 2: Secunty Architecture
[6]ISO/IEC 9594-8:2008. Information technology — Open Systems Interconnection — The Directory: Public-key
and attribute certificate frameworks— Part 8
[7]ISO/1EC/TR 14516. Information technology — Security techniques — Guidelines for the use and management of
Trusted Third Party services
(8JISO/IEC 15945, Information technology — Security techniques — Specification of TTP services to support the
application of digital signatures
[9]ISO/IEC 27002. Information technology — Security techniques — Code of practice for information security
controls
[10J ENV 13608-1. Health informatics — Security for healthcare communication — Concepts and terminology
(11)IETF/RFC 3647, Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework
(12)IETF/RFC 3739. Internet X.509 Public Key Infrastructure Qualified Certificates Profile
(13)IETF/RFC 3126. Electronic Signature Formats for long term electronic signatures
(14)IETF/RFC 3161. Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)
(15)IETF/RFC 3280. Internet X.509 Public Key Infrastructure CRL Profile
(16)IETF/RFC 3281. An Internet Attribute Certificate Profile for Authorization
(17)Ankney. R.. CertCo. Privilege Management Infrastructure. v0.4. August 24.1999
(18) APEC Telecommunications Working Group. Business Facilitation Steering Group Electronic Authentication Task
Group PKI Interoperability Expert Group. Achieving PKI Interoperability. September 1999
(19) ASTM Draft Standard. Standard Guide for Model Certification Practice Statement for Healthcare. January 2000
(20) Bernd B., & Roger-France F. A Systemic Approach for Secure Health Information Systems. Int. J. Med.
Inform. 2001. pp. 51— 78
(21J Canadian Institute for Health Information. Model Digital Signature and Confidentiality Certificate Policies. June 30.
2001
(22) COBIT (Control Objectives for Information and Related Technologies) specification produced by the Information
Systems Audit and Control Foundation
(23) Drummond Group. The Healthkey Program. PKI m Healthcare: Recommendations and Guidelines for
Community-based Testing. May 2000
(24) European Electronic Signature Standardization Initiative (EESSI). Final Report of the EESSI Expert Team. 20th
July 1999
(25)Feghhl J.. & Williams P. Digital Certificates — Applied Internet Security. Addison-Wesley. 1998
(26)Government of Canada. Criteria for Cross Certification. 2000
(27)Klein. G.. Lindstrom. V.. Norr. A.. Ribbegard. G. and Torlof, P. Technical Aspects of PKI. January 2000
(28) Klein. G., Lindstrom. V.. Norr. A.. Ribbegard. G.. Sonnergren, E. and Torlof. P. Infrastructure for Trust In Health
Informatics. January 2000
(29) Standards Australia. Strategies for the Implementation of a Public Key Authentication Framework (PKAF) in
Australia SAA MP75
(30)Wilson S. Audit Based Public Key Infrastructure. Price Waterhouse Coopers White Paper. November 2000
29