The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.
OPC 10000-1, OPC UA Specification: Part 1 – Overview and Concepts
http://www.opcfoundation.org/UA/Part1/
OPC 10000-3, OPC UA Specification: Part 3 – Address Space Model
DOCPROPERTY Part3URL \* MERGEFORMAT http://www.opcfoundation.org/UA/Part3/
OPC 10000-4, OPC UA Specification: Part 4 – Services
DOCPROPERTY Part4URL \* MERGEFORMAT http://www.opcfoundation.org/UA/Part4/
OPC 10000-5, OPC UA Specification: Part 5 – Information Model
DOCPROPERTY Part5URL \* MERGEFORMAT http://www.opcfoundation.org/UA/Part5/
OPC 10000-6, OPC UA Specification: Part 6 – Mappings
DOCPROPERTY Part6URL \* MERGEFORMAT http://www.opcfoundation.org/UA/Part6/
OPC 10000-7, OPC UA Specification: Part 7 – Profiles
DOCPROPERTY Part7URL \* MERGEFORMAT http://www.opcfoundation.org/UA/Part7/
OPC 10000-12, OPC UA Specification: Part 12 – Discovery
DOCPROPERTY Part12URL \* MERGEFORMAT http://www.opcfoundation.org/UA/Part12/
OPC 10000-14, OPC UA Specification: Part 14 – PubSub
DOCPROPERTY Part14URL \* MERGEFORMAT http://www.opcfoundation.org/UA/Part14/
OPC 10000-18, OPC UA Specification: Part 18: Role-Based Security
http://www.opcfoundation.org/UA/Part18/
ISA/IEC 62443: Security for industrial automation and control systems
https://webstore.iec.ch/publication/33615
SSL/TLS: RFC 2246: The TLS Protocol Version 1.0
http://www.ietf.org/rfc/rfc2246.txt
X509: X.509 Public Key Certificate Infrastructure
http://www.itu.int/rec/T-REC-X.509-200003-I/e
HTTP: RFC 2616: Hypertext Transfer Protocol - HTTP/1.1
http://www.ietf.org/rfc/rfc2616.txt
HTTPS: RFC 2818: HTTP Over TLS
http://www.ietf.org/rfc/rfc2818.txt
IS Glossary: Internet Security Glossary
http://www.ietf.org/rfc/rfc2828.txt
NIST 800-12: Introduction to Computer Security
http://csrc.nist.gov/publications/nistpubs/800-12/
NIST 800-57: Part 3: Application-Specific Key Management Guidance
http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_PART3_key-management_Dec2009.pdf
NERC CIP: CIP 002-1 through CIP 009-1, by North-American Electric Reliability Council
http://www.nerc.com/page.php?cid=2|20
SPP-ICS: Guide to Industrial Control Systems (ICS) Security
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf
SHA-1: Secure Hash Algorithm RFC
http://tools.ietf.org/html/rfc3174
PKI: Public Key Infrastructure article in Wikipedia
https://en.wikipedia.org/wiki/Public_key_infrastructure
X509 PKI: Internet X.509 Public Key Infrastructure
http://www.ietf.org/rfc/rfc3280.txt
RFC 5958: Asymmetric Key Packages
http://tools.ietf.org/search/rfc5208
PKCS #10: Certification Request Syntax Specification
http://tools.ietf.org/html/rfc2986
OAuth2: The OAuth 2.0 Authorization Framework
https://tools.ietf.org/html/rfc6749
JWT: JSON Web Token (JWT)
https://tools.ietf.org/html/rfc7519
OpenID: OpenID Connect Discovery 1.0
https://openid.net/specs/openid-connect-discovery-1_0.html