IEC 62351-11-2016 pdf download.Power systems management and associated information exchange – Data and communications security – Part 11: Security for XML documents.
This part of IEC 62351 specifies schema, procedures, and algorithms for securing XML documents that are used within the scope of the IEC as well as documents in other domains (e.g. IEEE, proprietary, etc.). This part is intended to be referenced by standards if secure exchanges are required, unless there is an agreement between parties in order to use other recognized secure exchange mechanisms.
This part of IEC 62351 utilizes well-known W3C standards for XML document security and provides profiling of these standards and additional extensions. The IEC 62351 -1 1 extensions provide the capability to provide:
• Header: the header contains information relevant to the creation of the secured document such as the Date and Time when IEC 62351 -1 1 was created.
• A choice of encapsulating the original XML document in an encrypted (Encrypted) or non- encrypted (nonEncrypted) format. If encryption is chosen, there is a mechanism providedto express the information required to actually perform encryption in an interoperable manner (EncryptionInfo).
• AccessControl: a mechanism to express access control information regarding information contained in the original XML document.
• Body: is used to contain the original XML document that is being encapsulated.
• Signature: a signature that can be used for the purposes of authentication and tamper detection.
The general structure is shown in Figure 1 .
For the measures described in this document to take effect, they must be accepted and referenced by the specifications themselves. This document is written to enable that process.
The subsequent audience for this part of IEC 62351 is intended to be the developers of products that implement these specifications.
Portions of this part of IEC 62351 may also be of use to managers and executives in order to understand the purpose and requirements of the work.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes requirements of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
IEC TS 62351 -2, Power systems management and associated information exchange – Data and communications security – Part 2: Glossary of terms
IEC TS 62351 -8, Power systems management and associated information exchange – Data and communications security – Part 8: Role-based access control
IEC TS 62351 -9, Power systems management and associated information exchange – Data and communications security – Part 9: Cyber security key management for power system equipment
Recommended Canonical XML1 .0 with comments, W3C,
http://www.w3.org/TR/2001 /REC-xml-c1 4n-2001 031 5#WithComments
Required Canonical XML 1 .0, Omits comments, W3C,
http://www.w3.org/TR/2001 /REC-xml-c1 4n-2001 031 5
RFC 6931 , Additional XML Security Uniform Resource Identifiers (URIs)
XML Encryption Syntax and Processing Version 1 .1 April 1 1 , 201 3, http://www.w3.org/TR/xmlenc-core1 /
XML Signature Syntax and Processing W3C Recommendation 1 0 June 2008, http://www.w3.org/TR/2008/REC-xmldsig-core-2008061 0/
3 Terms and definitions
For the purposes of this document, the terms and definitions given in IEC TS 62351 -2 and the following apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
• IEC Electropedia: available at http://www.electropedia.org/
• ISO Online browsing platform: available at http://www.iso.org/obp
3.1 nonce
random or pseudo-random value used within an authentication system
[SOURCE: IEEE Std 1 455-1 999, IEEE Standard for Message Sets for Vehicle/Roadside Communications].IEC 62351-11 pdf download.