Skip to main content

International Standardisation of IT Security

  • Chapter
  • First Online:
Book cover State of the Art in Applied Cryptography

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1528))

  • 789 Accesses

Abstract

This paper discusses the standards and activities of the ISO/IEC committee SC 27 “Information technology - Security techniques”, which develops general security mechanisms, guidelines and criteria for IT security, and of the European Telecommunications Standards Institute, which specifies security services as part of the standardisation of telecommunication systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CEC, Green Book on the Security of Information Systems, Draft 3.6, July 1993.

    Google Scholar 

  2. CEC, Information Technology Security Evaluation Criteria (ITSEC), Office for Official Publications of the European Communities, Brussels, Luxembourg, 1991.

    Google Scholar 

  3. CEN, European Standardization of the IT Security Evaluation Criteria, CEN Project Team PT05, issue 1.1, March 1993.

    Google Scholar 

  4. CEN/CENELEC/ETSI, Taxonomy and Directory of European Standardisation Requirements for Information Systems Security, M-IT-06.

    Google Scholar 

  5. CEN/CENELEC/ETSI, The Bulletin of the European Standards Organizations. Published 11 times a year by CEN, CENELEC, ETSI, subscriptions c/o CEN Infodesk, 36, rue de Stassart, B-1050 Bruxelles, Belgium.

    Google Scholar 

  6. M. De Soete and K. Vedder, Authentication Standards, in: W. Wolfowicz (ed.): State and Progress of Research in Cryptography, Fndazione Ugo Bordoni, Rome 1993, 207–218.

    Google Scholar 

  7. ETS 300 175-7, Digital Enhanced Cordless Telecommunications (DECT), Common interface, Part 7: Security Features, 1996 (2nd edition).

    Google Scholar 

  8. ETS 300 506 (GSM 02.09), Digital cellular telecommunications system (Phase 2); Security aspects.

    Google Scholar 

  9. ETS 300 534 (GSM 03.20), Digital cellular telecommunications system (Phase 2); Security related network functions.

    Google Scholar 

  10. FTPS 46: 1977, Federal Information Processing Standards Publication, Data Encryption Standard, National Bureau of Standards.

    Google Scholar 

  11. FIPS 81: 1980, Federal Information Processing Standards Publication, DES Modes of Operation, National Bureau of Standards.

    Google Scholar 

  12. ISO Bulletin. Published monthly by ISO Central Secretariat, 1, rue de Varembé, CH-1211 Geneva 20.

    Google Scholar 

  13. ISO Memento, ISO Central Secretariat, Geneva, 1996.

    Google Scholar 

  14. ISO/IEC Guide 2:1991, General Terms and Their Definitions Concerning Standardization and Related Activities, ISO and IEC, Geneva, 1991 (6th edition).

    Google Scholar 

  15. ISO/IEC, Directives, Procedures for the technical work of ISO/IEC JTC 1 on Information Technology, Geneva, 1995 (3rd edition).

    Google Scholar 

  16. ISO/IEC, Directives Part 3, Drafting and presentation of International Standards, Geneva 1989 (2nd edition).

    Google Scholar 

  17. ISO/IEC JTC 1/SC 27, Standing Document 4: Programme of Work, http://www.iso.ch:8080/isoweb.html.

  18. ISO/IEC JTC 1/SC 27, Standing Document 7: Catalogue of SC 27 Work Items and Standards, http://www.iso.ch:8080/isoweb.html.

  19. Kommission der EuropÄischen Gemeinschaften, Grünbuch der EG-Kommission zur Entwicklung der europÄischen Normung: Ma\nahmen für eine schnellere technologische Integration in Europa, KOM(90) 456, Brüssel 1990.

    Google Scholar 

  20. L. Krause, Data Encryption in ISO, the International Organization for Standardization, Computers & Standards 3 (1984), 195–198.

    Article  Google Scholar 

  21. K. Vedder, GSM: Security, Services and the SIM, this volume, pp. 227–243.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Vedder, K. (1998). International Standardisation of IT Security. In: State of the Art in Applied Cryptography. Lecture Notes in Computer Science, vol 1528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49248-8_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-49248-8_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65474-2

  • Online ISBN: 978-3-540-49248-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics