Shopping Cart

No products in the cart.

BSI 14/30230396 DC:2014 Edition

$13.70

BS ISO/IEC 24760-2. Information Technology. Security Techniques. A Framework for Identity Management. Part 2. Reference architecture and requirements

Published By Publication Date Number of Pages
BSI 2014 55
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
11 1. Scope
2. Normative references
3. Terms and definitions
14 4. Symbols and abbreviated terms
15 5. Reference Architecture
5.1 General
5.2 Architecture elements
5.2.1 Overview
5.2.2 Viewpoints
5.2.2.1 General
5.2.2.2 Context viewpoint
16 5.2.2.3 Functional viewpoint
5.3 Context view
5.3.1 Stakeholders
5.3.1.1 General
5.3.1.2 Principal
17 5.3.1.3 Identity management authority
5.3.1.4 Identity information authority
5.3.1.5 Relying party
5.3.1.6 Regulatory body
18 5.3.1.7 Consumer advocate
5.3.1.8 Consumer (and citizen) representative
5.3.1.9 Auditor
5.3.2 Actors
5.3.2.1 General
19 5.3.2.2 Principal
5.3.2.3 Identity management authority
20 5.3.2.4 Identity registration authority
5.3.2.5 Relying party
21 5.3.2.6 Identity information authority
5.3.2.7 Identity information provider
22 5.3.2.8 Verifier
23 5.3.2.9 Auditor
5.3.3 Context model
24 5.3.4 Use case model
5.3.4.1 General
25 5.3.4.2 Employee use cases
5.3.4.3 Employer use cases
5.3.4.4 Consumer use cases
5.3.4.5 Device use cases
5.3.5 Compliance and governance model
26 5.4 Functional view
5.4.1 Component model
5.4.1.1 General
5.4.1.2 Deployment
5.4.1.3 Principal
5.4.1.4 Identity register
27 5.4.2 Processes and services
5.4.2.1 Diagrams
5.4.2.1 Identity information flow
5.4.2.2 Identity information management processes
5.4.2.2.1 General
28 5.4.2.2.2 Identity information maintenance
5.4.2.2.3 Identity information processing
5.4.2.2.4 Granting identity processing access
5.4.2.3 Specific identity management processes
5.4.2.3.1 General
29 5.4.2.3.2 Auditing
5.4.2.3.3 Generating reference identifiers
5.4.2.3.4 Invalidation
30 5.4.2.4 Additional functions
5.4.2.4.1 General
31 5.4.2.4.2 Identity information profile service
5.4.2.4.3 Privacy consent service
5.4.2.4.4 Identity information authority discovery service
5.4.2.4.5 Publication service
32 5.4.3 Physical model
5.5 Identity management scenarios
5.5.1 General
5.5.2 Enterprise scenario
33 5.5.3 Federated scenario
5.5.4 Service scenario
5.5.5 Heterogeneous scenario
6. Requirements
6.1 General
34 6.2 Access policy for identity information
6.3 Functional requirements for management of identity information
6.3.1 Policy for identity information life cycle
6.3.2 Conditions and procedure to maintain identity information
35 6.3.3 Identity information presentation
6.3.4 Reference identifier
36 6.3.5 Identity information quality and compliance
6.3.6 Archiving information
37 6.3.7 Terminating and deleting identity information
6.4 Non functional requirements
39 Legal and regulatory aspects (Informative)
40 Use case model (Informative)
43 Component model (Informative)
A.1 Model
44 A.2 UML legend
46 Business Process model (Informative)
A.3 General
A.4 Consent management.
48 A.5 Credential lifecycle management
49 A.6 Configuration Data Management
50 A.7 Policy Management
51 A.8 Principal’s Life Cycle Management
BSI 14/30230396 DC
$13.70