Advertisement

International Standardisation of IT Security

  • Klaus Vedder
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1528)

Abstract

This paper discusses the standards and activities of the ISO/IEC committee SC 27 “Information technology - Security techniques”, which develops general security mechanisms, guidelines and criteria for IT security, and of the European Telecommunications Standards Institute, which specifies security services as part of the standardisation of telecommunication systems.

Keywords

Work Item International Electrotechnical Commission Cryptographic Algorithm Data Encryption Standard International Telecommunication Union 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    CEC, Green Book on the Security of Information Systems, Draft 3.6, July 1993.Google Scholar
  2. [2]
    CEC, Information Technology Security Evaluation Criteria (ITSEC), Office for Official Publications of the European Communities, Brussels, Luxembourg, 1991.Google Scholar
  3. [3]
    CEN, European Standardization of the IT Security Evaluation Criteria, CEN Project Team PT05, issue 1.1, March 1993.Google Scholar
  4. [4]
    CEN/CENELEC/ETSI, Taxonomy and Directory of European Standardisation Requirements for Information Systems Security, M-IT-06.Google Scholar
  5. [5]
    CEN/CENELEC/ETSI, The Bulletin of the European Standards Organizations. Published 11 times a year by CEN, CENELEC, ETSI, subscriptions c/o CEN Infodesk, 36, rue de Stassart, B-1050 Bruxelles, Belgium.Google Scholar
  6. [6]
    M. De Soete and K. Vedder, Authentication Standards, in: W. Wolfowicz (ed.): State and Progress of Research in Cryptography, Fndazione Ugo Bordoni, Rome 1993, 207–218.Google Scholar
  7. [7]
    ETS 300 175-7, Digital Enhanced Cordless Telecommunications (DECT), Common interface, Part 7: Security Features, 1996 (2nd edition).Google Scholar
  8. [8]
    ETS 300 506 (GSM 02.09), Digital cellular telecommunications system (Phase 2); Security aspects.Google Scholar
  9. [9]
    ETS 300 534 (GSM 03.20), Digital cellular telecommunications system (Phase 2); Security related network functions.Google Scholar
  10. [10]
    FTPS 46: 1977, Federal Information Processing Standards Publication, Data Encryption Standard, National Bureau of Standards.Google Scholar
  11. [11]
    FIPS 81: 1980, Federal Information Processing Standards Publication, DES Modes of Operation, National Bureau of Standards.Google Scholar
  12. [12]
    ISO Bulletin. Published monthly by ISO Central Secretariat, 1, rue de Varembé, CH-1211 Geneva 20.Google Scholar
  13. [13]
    ISO Memento, ISO Central Secretariat, Geneva, 1996.Google Scholar
  14. [14]
    ISO/IEC Guide 2:1991, General Terms and Their Definitions Concerning Standardization and Related Activities, ISO and IEC, Geneva, 1991 (6th edition).Google Scholar
  15. [15]
    ISO/IEC, Directives, Procedures for the technical work of ISO/IEC JTC 1 on Information Technology, Geneva, 1995 (3rd edition).Google Scholar
  16. [16]
    ISO/IEC, Directives Part 3, Drafting and presentation of International Standards, Geneva 1989 (2nd edition).Google Scholar
  17. [17]
    ISO/IEC JTC 1/SC 27, Standing Document 4: Programme of Work, http://www.iso.ch:8080/isoweb.html.
  18. [18]
    ISO/IEC JTC 1/SC 27, Standing Document 7: Catalogue of SC 27 Work Items and Standards, http://www.iso.ch:8080/isoweb.html.
  19. [19]
    Kommission der EuropÄischen Gemeinschaften, Grünbuch der EG-Kommission zur Entwicklung der europÄischen Normung: Ma\nahmen für eine schnellere technologische Integration in Europa, KOM(90) 456, Brüssel 1990.Google Scholar
  20. [20]
    L. Krause, Data Encryption in ISO, the International Organization for Standardization, Computers & Standards 3 (1984), 195–198.CrossRefGoogle Scholar
  21. [21]
    K. Vedder, GSM: Security, Services and the SIM, this volume, pp. 227–243.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Klaus Vedder
    • 1
  1. 1.Giesecke & Devrient GmbHMünchenGermany

Personalised recommendations