Skip to main content

TeleTrusT-Security Application Programming Interface

Aufgabe der TeleTrusT Arbeitsgruppe „Anwendungen“

  • Chapter
Sicherheitsschnittstellen — Konzepte, Anwendungen und Einsatzbeispiele
  • 43 Accesses

Zusammenfassung

Der Beitrag beschreibt die funktionalen Anforderungen der TeleTrusT-Security-API. TeleTrusT hat mehrere, bereits existierende Security-APIs untersucht. Ziel der Untersuchung war es eine API zu finden, die möglichst alle funktionalen Anforderungen der TeleTrusTSecurity-API abdeckt.. Die untersuchten APIs werden kurz vorgestellt und bewertet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  • CCITT X.509, Recommendation X.509, The Directory - Authentication Frame-work, 1988.

    Google Scholar 

  • ISO 7498-2: Information processing systems - Open Systems Interconnection -Basic Reference Model - Part 2: Security Architecture, 1989

    Google Scholar 

  • ISO/IEC 8824: Information technology - Open Systems Interconnection -Specification of Abstract Syntax Notation One (ASN.1), 1990

    Google Scholar 

  • ISO/IEC 8825: Information technology - Open Systems Interconnection -Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1), 1990

    Google Scholar 

  • ISO/IEC 9798-1: Information technology - Security techniques- Entity authenticationmechanisms - Part 1:General Model, 1991

    Google Scholar 

  • ISO/IEC 9798-3: Information technology - Security techniques–Entity authentication mechanisms - Part 3:Entity authentication using a public key algorithm, 1993

    Google Scholar 

  • Schneider, W. (Ed.) Security Information Objects - The TELETRUST/TELESECCertificate - TELE-TRUST AG4 3-92, März 1992

    Google Scholar 

  • Schäfer, W. (Ed.) Security Information Objects - The TELETRUST SEDU - (Security Enhanced Data Unit), TELETRUST AG4 21-92, November 1992

    Google Scholar 

  • Schindler S. The Programmer Interface - SEC API (draft),Fa.TELES,November 1990

    Google Scholar 

  • Kummer R.,Pröll D.,

    Google Scholar 

  • Sauer G.,Schäfer W. DATEV Securtiy API, Version 0. 0, DATEV eG, Dezember 1990

    Google Scholar 

  • Kaijser P.,Nilsson S.,

    Google Scholar 

  • Steinacker M. Contribution on Securiity APIs, Siemens Nixdorf Informationssysteme AG/Siemens AG, Dezember 1992

    Google Scholar 

  • Eckstein STARCOS-Smartcard-API, Version 1.0, GMD/GA0,1992

    Google Scholar 

  • NBV Standaard NBV SECURITY API, Nederlandse Vereniging van

    Google Scholar 

  • Banken, Juni 1993 Brand T. (Ed.) Funktionale Anforderungen an die TeleTrusT-Security-API, TeleTrusT AG4 12-93, September 1993

    Google Scholar 

  • NBÜ 3.05 Verschiedene EDIFACT-Dokumente AUTACK-Message, CHIPER-Message, EDIFACT Security implementation guidelines DIN,1993

    Google Scholar 

  • Kowalski B., CT-API, Telekom/ PZ Telesec,GMD,RWTÜV Anlagentechnik

    Google Scholar 

  • Moos R.,Struif B., GmbH Oktober 1993

    Google Scholar 

  • Atrott J.,Baumgart R.

    Google Scholar 

  • Linn,J. Generic Security Service Application Program Interface,September 1993

    Google Scholar 

  • Burton S.K. Jr., Public Key Cryptography Standard, RSA Data Security Inc, November 1993

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Maier, K. (1994). TeleTrusT-Security Application Programming Interface. In: Fumy, W., Meister, G., Reitenspieß, M., Schäfer, W. (eds) Sicherheitsschnittstellen — Konzepte, Anwendungen und Einsatzbeispiele. Deutscher Universitätsverlag, Wiesbaden. https://doi.org/10.1007/978-3-663-06728-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-663-06728-3_13

  • Publisher Name: Deutscher Universitätsverlag, Wiesbaden

  • Print ISBN: 978-3-8244-2059-9

  • Online ISBN: 978-3-663-06728-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics