2 Reference documents ToC Previous Next

The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments and errata) applies.

OPC 10000-1: OPC Unified Architecture - Part 1: Overview and Concepts
     http://www.opcfoundation.org/UA/Part1/

OPC 10000-3: OPC Unified Architecture - Part 3: Address Space Model
     http://www.opcfoundation.org/UA/Part3/

OPC 10000-4: OPC Unified Architecture - Part 4: Services
     http://www.opcfoundation.org/UA/Part4/

OPC 10000-5: OPC Unified Architecture - Part 5: Information Model
     http://www.opcfoundation.org/UA/Part5/

OPC 10000-6: OPC Unified Architecture - Part 6: Mappings
     http://www.opcfoundation.org/UA/Part6/

OPC 10000-7: OPC Unified Architecture - Part 7: Profiles
     http://www.opcfoundation.org/UA/Part7/

OPC 10000-12: OPC Unified Architecture - Part 12: Discovery and Global Services
     http://www.opcfoundation.org/UA/Part12/

OPC 10000-14: OPC Unified Architecture - Part 14 PubSub
     http://www.opcfoundation.org/UA/Part14/

SOAP Part 1: SOAP Version 1.2 Part 1: Messaging Framework
     http://www.w3.org/TR/soap12-part1/

SOAP Part 2: SOAP Version 1.2 Part 2: Adjuncts
     http://www.w3.org/TR/soap12-part2/

SSL/TLS: RFC 2246: The TLS Protocol Version 1.0
     http://www.ietf.org/rfc/rfc2246.txt

X509: X.509 Public Key Certificate Infrastructure
     http://www.itu.int/rec/T-REC-X.509-200003-I/e

HTTP: RFC 2616: Hypertext Transfer Protocol - HTTP/1.1
     http://www.ietf.org/rfc/rfc2616.txt

HTTPS: RFC 2818: HTTP Over TLS
     http://www.ietf.org/rfc/rfc2818.txt

IS Glossary: Internet Security Glossary
     http://www.ietf.org/rfc/rfc2828.txt

NIST 800-12: Introduction to Computer Security
     http://csrc.nist.gov/publications/nistpubs/800-12/

NIST 800-57: Part 3: Application-Specific Key Management Guidance
     http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_PART3_key-management_Dec2009.pdf

NERC CIP: CIP 002-1 through CIP 009-1, by North-American Electric Reliability Council
     http://www.nerc.com/page.php?cid=2|20

SPP-ICS: Guide to Industrial Control Systems (ICS) Security
     http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf

SHA-1: Secure Hash Algorithm RFC
     http://tools.ietf.org/html/rfc3174

PKI: Public Key Infrastructure article in Wikipedia
     https://en.wikipedia.org/wiki/Public_key_infrastructure

X509 PKI: Internet X.509 Public Key Infrastructure
     http://www.ietf.org/rfc/rfc3280.txt

RFC 5958: Asymmetric Key Packages
     http://tools.ietf.org/search/rfc5208

PKCS #10: Certification Request Syntax Specification
     http://tools.ietf.org/html/rfc2986

OAuth2: The OAuth 2.0 Authorization Framework
     https://tools.ietf.org/html/rfc6749

JWT: JSON Web Token (JWT)
     https://tools.ietf.org/html/rfc7519

OpenID: OpenID Connect Discovery 1.0
     https://openid.net/specs/openid-connect-discovery-1_0.html

:

     Terms, definitions, and abbreviations

Previous Next