I.S. CEN TS 15523:2006
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
POSTAL SERVICE - STATEMENT OF MAILING SUBMISSION
Hardcopy , PDF
09-29-2011
English
01-01-2006
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and Abbreviations
5 General Concepts
5.1 Mail communication system domains
5.2 Parties, agents and their roles
5.2.1 Party attribute
5.2.2 Agent attribute
5.3 Physical objects
5.3.1 Mail item
5.3.2 Mail entity
5.3.3 Mail receptacle
5.3.4 Mail set
5.3.5 Mailing submission, acceptance and submission group
5.4 Informational objects
5.4.1 Mail entity attribute
5.4.2 Mail receptacle attribute
5.4.3 Mail entity set attribute
5.4.4 Mail entity set catalogue
5.4.5 Statement of mailing submission
5.4.6 Electronically exchanged message
5.4.7 Observation
5.4.8 Observation attribute
5.4.9 Expectation
5.4.10 Postal product/service
5.4.11 Postal product/service attribute
5.4.12 Contract and contract attributes
5.5 Mailer domain process
5.5.1 Message/content preparation
5.5.2 List selection
5.5.3 List preparation
5.5.4 Electronic sortation
5.5.5 Printing
5.5.6 Insertion
5.5.7 Finishing
5.5.8 Physical sortation
5.5.9 Containerisation
5.5.10 Transportation
5.5.11 Induction
5.6 Interfaces
6 Statement of mailing submission (SMS)
6.1 SMS structure
6.2 Message Content
6.2.1 SMS.Header
6.2.2 SMS.Submission
6.2.3 SMS.Parties
6.2.4 SMS.Handover
6.2.5 SMS.MailEntitySets
6.2.6 SMS.MailEntities
6.3 Message Format
6.4 Communication Protocol
6.5 Communication channel security
7 Application Security
7.1 Introduction
7.2 Threats and Vulnerabilities
7.3 Applications and Message Level Security
7.4 Security Services and Message-level Countermeasures
7.5 Application-level Countermeasures
7.5.1 Access and Usage Controls
7.5.2 Countermeasures against Counterfeiting
7.5.3 Countermeasures against Duplication (copying)
7.5.4 Countermeasures against Inappropriate Induction
7.5.5 Countermeasures against Miss-Application
7.5.6 Countermeasures against Collusion
7.5.7 Countermeasures against Impersonation
7.5.8 Obliteration countermeasures
7.5.9 Countermeasures against inappropriate Refund Request
Annex A (informative) Examples of SMS documents
Annex B (informative) Text of the XML Schema for SMS
Annex C (informative) Example of a protocol for secure
communication of EEM
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.