Work item:
|
X.sr-di
|
Subject/title:
|
Security requirements for DLT-based invoices
|
Status:
|
Under study [Issued from previous study period]
|
Approval process:
|
TAP
|
Type of work item:
|
Recommendation
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
2026-02 (Medium priority)
|
Liaison:
|
ISO TC307, TC68 SC2 WG13, ITU-T SG3, SG16
|
Supporting members:
|
Korea (Republic of), KISA
|
Summary:
|
Electronic invoices automate and streamline the traditional invoicing and billing processes, providing cost savings and improved payment flow. DLT-based invoices overcome limitations such as data exposure and human errors found in conventional invoices, ensuring data integrity, overcoming single points of failure. This draft Recommendation specifies potential security threats at each layer (i.e., core layer, attestation layer, application layer, regional routing layer, and cross-border routing layer) of an architecture of DLT-based invoices. Security threats are identified for each layer of the architecture of DLT-based invoices. Security requirements are specified to mitigate the identified security threats.
Electronic invoices automate and streamline the traditional invoicing and billing processes, providing cost savings and improved payment flow. DLT-based invoices overcome limitations such as data exposure and human errors found in conventional invoices, ensuring data integrity, overcoming single points of failure. This draft Recommendation specifies potential security threats at each layer (i.e., core layer, attestation layer, application layer, regional routing layer, and cross-border routing layer) of an architecture of DLT-based invoices. Security threats are identified for each layer of the architecture of DLT-based invoices. Security requirements are specified to mitigate the identified security threats.
|
Comment:
|
-
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2024-09-12 17:58:57
|
Last update:
2024-09-17 16:52:21
|
|