{"id":520226,"date":"2024-11-05T14:58:18","date_gmt":"2024-11-05T14:58:18","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/csa-iso-iec-1928619\/"},"modified":"2024-11-05T14:58:18","modified_gmt":"2024-11-05T14:58:18","slug":"csa-iso-iec-1928619","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/csa-iso-iec-1928619\/","title":{"rendered":"CSA ISO\/IEC 19286:19"},"content":{"rendered":"
CSA Preface<\/strong><\/p>\n <\/p>\n Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO\/IEC Joint Technical Committee 1 on Information Technology (ISO\/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).<\/p>\n <\/p>\n This Standard has been formally approved, without modification, by the Technical Committee and has been developed in compliance with Standards Council of Canada requirements for National Standards of Canada. It has been published as a National Standard of Canada by CSA Group.<\/p>\n <\/p>\n Scope<\/strong><\/p>\n <\/p>\n This document aims to normalize privacy-enhancing protocols and services by<\/p>\n <\/p>\n \u2014 using the mechanisms from parts of ISO\/IEC 7816 and parts of ISO\/IEC 18328 that contribute to security and privacy<\/p>\n <\/p>\n \u2014 providing discoverability means of privacy-enabling attributes<\/p>\n <\/p>\n \u2014 defining requirements for attribute-based credential handling, and<\/p>\n <\/p>\n \u2014 identifying data objects and commands for ICCs.<\/p>\n <\/p>\n Existing privacy-enhancing protocols available in a generic context are adopted for distributed systems including ICCs. Additionally, existing authentication protocols between an ICC and an external device used for establishing a secure channel are enhanced with privacy protection. Secure communication between an ICC and an on-card device is also considered.<\/p>\n <\/p>\n All the protocols and services described in this document contribute to privacy. Annex B describes an example of privacy impact assessments of respective systems.<\/p>\n","protected":false},"excerpt":{"rendered":" Identification cards \u2014 Integrated circuit cards \u2014 Privacy-enhancing protocols and services<\/b><\/p>\n\n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n CSA<\/b><\/a><\/td>\n 2019<\/td>\n 94<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":520242,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[693,2674],"product_tag":[],"class_list":{"0":"post-520226","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-15","7":"product_cat-csa","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/520226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/520242"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=520226"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=520226"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=520226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}