{"id":515443,"date":"2024-11-05T14:35:22","date_gmt":"2024-11-05T14:35:22","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/can-csa-iso-iec-9798-112\/"},"modified":"2024-11-05T14:35:22","modified_gmt":"2024-11-05T14:35:22","slug":"can-csa-iso-iec-9798-112","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/csa\/can-csa-iso-iec-9798-112\/","title":{"rendered":"CAN\/CSA-ISO\/IEC 9798-1:12"},"content":{"rendered":"

Preface<\/strong><\/p>\n

Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the Canadian Advisory Committee (CAC) on ISO\/IEC Joint Technical Committee 1 on Information Technology (ISO\/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).<\/p>\n

At the time of publication, ISO\/IEC 9798-1:2010 is available from ISO and IEC in English only. CSA will publish the French version when it becomes available from ISO and IEC.<\/p>\n

Scope<\/strong><\/p>\n

This part of ISO\/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques. These mechanisms are used to corroborate that an entity is the one that is claimed. An entity to be authenticated proves its identity by showing its knowledge of a secret. The mechanisms are defined as exchanges of information between entities and, where required, exchanges with a trusted third party.<\/p>\n

The details of the mechanisms and the contents of the authentication exchanges are given in subsequent parts of ISO\/IEC 9798.<\/p>\n","protected":false},"excerpt":{"rendered":"

Information technology – Security techniques – Entity authentication – Part 1: General<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
CSA<\/b><\/a><\/td>\n2012-03-13<\/td>\n30<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":515454,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[657,2674],"product_tag":[],"class_list":{"0":"post-515443","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040","7":"product_cat-csa","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/515443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/515454"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=515443"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=515443"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=515443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}