ГОСТ Р ИСО 17090-2—2016
Библиография
[1]ISO/IEC 2382-8:1998. Information technology — Vocabulary — Pari 8: Security
[2] ISO/IEC 7498-2. Information processing systems — Open Systems Interconnection — Basic Reference Model —
Part 2: Security Architecture
[3] ISO/IEC 8824-1:1998. Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic
notation — Part 1
[4] ISO/IEC 9594-8:2001. Information technology — Open Systems Interconnection — The Directory: Publickey and
attribute certificate frameworks — Part 8
[5] ISO/IEC 10181-1:1996. Information technology — Open Systems Interconnection — Security frameworks for open
systems: Overview
[6] ISO/IEC TR 13335-1. Information technology — Guidelines for the management of ITSecurity — Part 1: Concepts
and models for IT security
[7]ISO/IEC 14516. Information technology — Security techniques — Guidelines for the use and management of
Trusted Third Party services
[8] ISO/IEC 15945, Information technology — Security techniques — Specification of TTP services to support the
application digital signatures
[9]ISO/IEC 17799:2005. Information technology — Code of practice for information security management
[10]IETF/RFC 5280. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
[11]IETF/RFC 3647. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework
[12]IETF/RFC 3739. Internet X.509 Public Key Infrastructure Qualified Certificates Profile
[13]ENV 13608-1. Health informatics — Security for healthcare communication — Concepts and terminology
[14]ANKNEY. R. CertCo. Privilege Management Infrastructure. v0.4. August 24. 1999
[15]APEC Telecommunications Working Group. Business Facilitation Steering Group Electronic Authentication Task
Group PKI Interoperability Expert Group, Achieving PKI Interoperability. September. 1999
[16]ASTM Draft Standard. Standard Guide for Model Certification Practice Statement for Healthcare. January 2000
[17]BERND. B.. ROGER-FRANCE, F. A Systemic Approach for Secure Health Information Systems. International
Journal of Medical Informatics (2001). pp. 51-78
[18]Canadian Institute for Health Information. Model Digital Signature and Confidentiality Certificate Policies. June 30
2001.
http://secure.dhi.ca./cihiweh/dispPage.jsp?cw_page=infostand_pki_e
25