Access control for telebiometrics data protection |
|
Recommendation ITU-T X.1080.0, Access control for telebiometrics data protection, is a specification for how to protect telebiometrics information against unauthorized access. It does so by taking a service-oriented view, where only information necessary for a particular purpose is provided, i.e., access is given not only on a right-to-know basis, but also on a need-to-know basis.
The heart of this Recommendation is an attribute specification included in an attribute certificate or public-key certificate that specifies in details what privileges a particular entity has for one or more service types.
Security is provided by using a profile of the cryptographic message syntax (CMS). The CMS profile provides authentication, integrity and, when required, confidentiality (encryption).
This profile is intended to provide security support for telebiometrics specifications in general. The profile assumes and is dependent upon a correct deployment of a public-key infrastructure (PKI).
Recommendation ITU-T X.1080.0 is also dependent on a deployment of a privilege management infrastructure (PMI).
|
|
Citation: |
https://handle.itu.int/11.1002/1000/13193 |
Series title: |
X series: Data networks, open system communications and security X.1000-X.1099: Information and network security X.1080-X.1099: Telebiometrics |
Approval date: |
2017-03-30 |
Provisional name: | X.pbact |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|