- 1 - X.ticsc. X.samtn. ICT Security Standards Roadmap Information security management guidelines for small and medium telecommunication organizations

Size: px
Start display at page:

Download "- 1 - X.ticsc. X.samtn. ICT Security Standards Roadmap Information security management guidelines for small and medium telecommunication organizations"

Transcription

1 - 1 - Acknowledging the active involvement of SG17 editors and contributors to the development of SG17 deliverables in Study Period (8 17 September 2015) Abbie Barbir Alexey Koshka Bo Yu, Jie Yuan, Chen Zhang Byoung-Moon Chin, Vibha Tomar Cai Chen Chang Oh Kim, Wataru Senga Damir Rajnovic David Keller, Laura Prin X.TRsuss X.nessa X.ticsc X.samtn X.sgsm X.1521 (X.cvss) X.1341 (X.cmail) Z.161 Z Z Z Z Z Z.165 Z Z.166 Technical Report on the successful use of security standards Access control models for incidents exchange networks ITU-T X.1245 Supplement on Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE Security assessment techniques in telecommunication/ict networks ICT Security Standards Roadmap Information security management guidelines for small and medium telecommunication organizations Common vulnerability scoring system 3.0 Certified mail transport and certified post office protocols 3 core language 3 language extensions: Support of interfaces with continuous signals 3 language extensions: Configuration and deployment support 3 language extensions: Advanced parameterization 3 language extensions: Behaviour types 3 language extensions: Performance and real time testing 3 runtime interface (TRI) 3 extension package: Extended TRI 3 control interface (TCI) Z.168 Testing and Test Control Notation version 3: The IDL to TTCN-3 mapping Z.169 Testing and Test Control Notation version 3: Using XML schema with TTCN-3

2 - 2 - Z.161 Z Z Z Z Z Z.164 Z.165 Z Z.166 Z.167 Z.168 Z.169 Z.170 Eric Andersen, Michele Peiry X.pbact X.500 X.501 X.509 X.511 X core language 3 language extensions: Support of interfaces with continuous signals 3 language extensions: Configuration and deployment support 3 language extensions: Advanced parameterization 3 language extensions: Behaviour types 3 language extensions: Performance and real time testing 3 operational semantics 3 runtime interface (TRI) 3 extension package: Extended TRI 3 control interface (TCI) Testing and Test Control Notation version 3: Using ASN.1 with TTCN-3 Testing and Test Control Notation version 3: The IDL to TTCN-3 mapping Testing and Test Control Notation version 3: Using XML schema with TTCN-3 3 documentation comment specification Privacy-based access control in telebiometrics Interconnection The Directory: Overview of concepts, models and services Interconnection The Directory Models Interconnection The Directory Public-key and attribute certificate frameworks Interconnection The Directory Abstract service definition Interconnection The Directory Procedures for distributed operations

3 - 3 - Feng Gao, Laifu Wang,, Annan Zhu Gao Feng, Hirotaka Yoshida Hongwei Luo, Laifu Wang Hongwei Luo, Laifu Wang Huamin Jin, Shuai Wang, Hyoungshick Kim, JungSoo Park Hyungjin Lim, Jongyoul Park, Ik-Kyun Kim, Jong-Hyun Kim, Heung-Youl, Bo Yu X.519 X.520 X.521 X.525 X.pki-em X.pki-prof X.1247 (X.tfcmm) X.websec-6 X.tigsc X.iotsec-1 X.sgmvno X.tfcma X.cspim X.sdnsec-1 X.websec-7 X.simef X.sbb Interconnection The Directory Protocol specifications Interconnection The Directory Selected attribute types Interconnection The Directory Selected object classes Interconnection The Directory Replication Information technology Public-Key Infrastructure: Establishment and maintenance Information technology Public-Key Infrastructure: Profile Technical framework for countering mobile messaging spam Security framework and requirements for open capabilities of telecommunication services Technical implementation guidelines for ITU-T X.805 Simple encryption procedure for Internet of Things (IoT) environments ITU-T X.805 Supplement on Security guideline for mobile virtual network operator (MVNO) Technical framework for countering mobile inapplication advertising spam Technical requirements for countering instant messaging spam (SPIM) Security services using the Software-defined networking Reference monitor for online analytics services Session information message exchange format (SIMEF) Security capability requirements for countering smartphone-based botnets

4 - 4 - Jason Kim, Nak Hyun Kim, Yong Nyuo Shin Jean-Paul Lemaire Jun Seob Lee, Bo Yu, Kyeong Hee Oh, Wataru Senga Deawoo Park Jae-Nam Ko,, Seung-Woo Yu Min Zuo Masashi Eto, Koji Nakao Michael Harrop X.tam X.cms X.oiddev X.gsiiso X.msec-9 X.1051rev X.gcspi X.sup-gpim X.1256 (X.authi) X.itssec-1 X.TRSM6ed A guideline to technical and operational countermeasures for telebiometric applications using mobile devices Information technology Generic applications of ASN.1 Cryptographic Message Syntax (CMS) Information technology Use of object identifiers in the Internet of Things Guidelines on security of the individual information service for operators Functional security requirements and architecture for mobile phone anti-theft measures Information technology Security techniques Code of practice for Information security controls based on ISO/IEC for telecommunications organizations ITU-T X.1242 Supplement on Guideline for countermeasures against short message service (SMS) phishing incidents ITU-T X.gpim Supplement on Code of practice for personally identifiable information protection for telecommunications organizations Guidelines and framework for sharing network authentication results with service applications Secure software update capability for intelligent transportation system communications devices Technical Report Security in telecommunications and information technology An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications; 6 th edition Michele Peiry X.th2 Telebiometrics related to physics Michele Peiry X.th3 Telebiometrics related to chemistry Mijoo Kim, Jeong-Jun Suh, Mi Yeon Yoon Ming Feng, Jun Shen, Huirong Tian, Laifu Wang X.sgsec-1 X.1642 (X.goscc) Security functional architecture for smart grid services using telecommunication networks Guidelines for the operational security of cloud computing

5 - 5 - Myung Geun Chun, Jason Kim, Yong Nyuo Shin X.bhsm Information technology Security Techniques Telebiometric authentication framework using biometric hardware security module Nan Meng X.1601rev Security framework for cloud computing Nan Meng, Huirong Tian Olivier Vuillemin X.CSCDataSec X.th13 Guidelines for cloud service customer data security Holosphere to biosphere secure data acquisition and telecommunication protocol Paul Gerome X.th4 Telebiometrics related to biology Paul Gerome X.th5 Telebiometrics related to culturology Paul Gerome X.th6 Telebiometrics related to psychology Radu Marian Richard Anago, Anfana Traore X.1257 (X.iamt) X.sup-gisb Z.Imp100 Z.100 Z.101 Z.102 Z.103 Z.104 Z.105 Z.106 Z.107 Z.111 Z.100 Annex F1 Z.100 Annex F2 Identity and access management taxonomy ITU-T X.1054 Supplement on Best practice for implementation of Rec. ITU-T X.1054 ISO /IEC on governance of information security Case of Burkina Faso Specification and Description Language implementer's guide - Version of SDL-2010 Specification and Description Language - Basic SDL-2010 Specification and Description Language - Comprehensive SDL-2010 Specification and Description Language - Shorthand notation and annotation in SDL-2010 Specification and Description Language - Data and action language in SDL-2010 Specification and Description Language - SDL-2010 combined with ASN.1 modules Specification and Description Language - Common interchange format for SDL-2010 Specification and Description Language - Objectoriented data in SDL-2010 Notations and guidelines for the definition of ITU-T languages of SDL SDL formal definition: General overview of SDL SDL formal definition: Static semantics

6 - 6 - Z.100 Annex F3 Z.109 Z.151 Sandor Mazgon Sang-Woo Lee, Jae-Hoon Nah Sok Joon Lee Soonjoung Byun, Lijun Liu Tae Kyun Kim, Hyung-Jin Lim Tae Kyung Kim, Tae-Jin Lee, Jeong-Jun Suh Woong Go, Haeryong Park, Jeong-Jun Suh Xia Junjie, Heung-Youl Xuetao Du, Tao Lou Youki Kadobayashi Youki Kadobayashi Youki Kadobayashi, Daisuke Miyamoto Zhaoji Lin X.itssec-2 X.1155 (X.sap-5) X.gpim X.1157 (X.sap-7) X.eaaa X.gcsfmpd X.sgsec-2 X.iotsec-2 X.1246 (X.tivcs) X.1500 Amd.8 X.1500 Amd.9 X.cogent X.1314 Cor.1 of SDL SDL formal definition: Dynamic semantics Specification and Description Language - Unified modeling language profile for SDL-2010 User Requirements Notation (URN) - Language definition Security Compendia Security guidelines for V2X communication systems Guidelines on local linkable anonymous authentication for electronic services Information technology Security techniques Code of practice for Personally Identifiable Information protection Technical capabilities of fraud detection and response for services with high assurance level requirements Enhanced entity authentication based on aggregated attributes ITU-T X.1231 Supplement on guidance of countering spam for mobile phone developers Security guidelines for home area network (HAN) devices in smart grid systems Security framework for Internet of Things Technologies involved in countering voice spam in telecommunication organizations Overview of cybersecurity information exchange Amendment 8 Revised structured cybersecurity information exchange techniques Overview of cybersecurity information exchange Amendment 9 Revised structured cybersecurity information exchange techniques Design considerations for improved end-user perception of trustworthiness indicators Security requirements and framework of ubiquitous networking Corrigendum 1

7 - 7 - Dongya Wu Jae Hoon Nah Ruoni Wang, Peng Zhao Zhiyuan Hu, Min Shu, Ye Tao, Ni Zhang Zhiyuan Hu, Ye Tao X.oid-iot X.websec-8 X.1602 (X.sfcse) X.dsms X.sdnsec-2 ITU-T X.660 Supplement on Guidelines for using object identifiers for the Internet of Things Security protection guidelines for value-added services for telecommunication operator Security requirements for software as a service application environments Data security requirements for the monitoring service of cloud computing Security requirements and reference architecture for Software-Defined Networking

Editor(s) Contributors Acronym Title. Technical Report on the successful use of security standards. Abbie Barbir. Trust elevation protocol

Editor(s) Contributors Acronym Title. Technical Report on the successful use of security standards. Abbie Barbir. Trust elevation protocol - 1 - Acknowledging the active involvement of SG17 editors and contributors to the development of SG17 deliverables in Study Period 2013-2016 (14 23 March 2016) Abbie Barbir Abbie Barbir, Abbie Barbir,

More information

Study Group 17 (Security) ITU Sector of Standardiza9on (ITU-T)

Study Group 17 (Security) ITU Sector of Standardiza9on (ITU-T) Study Group 17 (Security) ITU Sector of Standardiza9on (ITU-T) Vasily Dolmatov ITU-T Study Group 17 Overview Primary focus is to build confidence and security in the use of Informa6on and Communica6on

More information

ITU-T SG 17 Achievements in ICT Security Standardization

ITU-T SG 17 Achievements in ICT Security Standardization ITU-T SG 17 Achievements in ICT Security Standardization Arkadiy Kremer (Chairman, ITU-T Study Group 17) kremer@rans.ru 6th ETSI SECURITY WORKSHOP, 19.01.2011 1/15 Topics ITU Plenipotentiary Conference

More information

Privacy Security IdM Trust Observations from ITU T Study Group 17

Privacy Security IdM Trust Observations from ITU T Study Group 17 Privacy Security IdM Trust Observations from ITU T Study Group 17 ETSI Security Week Security Workshop Session 3: Security in other Standards and Industry Forums Strategic overviews stress on Privacy work

More information

Security Standardization

Security Standardization ISO-ITU ITU Cooperation on Security Standardization Dr. Walter Fumy Chairman ISO/IEC JTC 1/SC 27 Chief Scientist, Bundesdruckerei GmbH, Germany 7th ETSI Security Workshop - Sophia Antipolis, January 2012

More information

Introduction of ITU-T Study Group 17 Security for ITS perspective

Introduction of ITU-T Study Group 17 Security for ITS perspective Introduction of ITU-T Study Group 17 Security for ITS perspective (Primary focus in SG17 is to build confidence and security in the use of Information and Communication Technologies (ICTs)) July 29, 2015

More information

5G security activities and future plan in ITU-T SG17

5G security activities and future plan in ITU-T SG17 5G security activities and future plan in ITU-T SG17 Heung Youl Youm, PhD Chairman, ITU-T SG17 Professor, Soonchunhyang University, Korea(Rep. of) Content Strategic Vision for ITU-T SG17 Overview of 5G

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 27017 First edition 2015-12-15 Information technology Security techniques Code of practice for information security

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Series X Supplement 31 (09/2017) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS

More information

ITU-T Standardization on Countering Spam

ITU-T Standardization on Countering Spam Joint Internet Society, CITEL and ITU Workshop on Combating SPAM (Mendoza, Argentina, 7 October 2013) ITU-T Standardization on Countering Spam Sergio Scarabino Area Representative sergio.scarabino@itu.int

More information

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community

Information Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community Information Security Management Systems Standards ISO/IEC 27001 Global Opportunity for the Business Community Prof. Edward (Ted) Humphreys IPA Global Symposium 2013 23 rd May 2013, Tokyo, Japan CyberSecurity

More information

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

Deploying Access Control using Extended XACML in Open Web Service Environment

Deploying Access Control using Extended XACML in Open Web Service Environment Deploying Access Control using Extended XACML in Open Web Service Environment Thirumaran.M Pondicherry Engg College Dhavachelvan.P Pondicherry University Divya.A Pondicherry Engg College ABSTRACT Now a

More information

S2-2 Activities in Focus Group on Smart Grid in ITU-T

S2-2 Activities in Focus Group on Smart Grid in ITU-T TTC Workshop on EMC Standardization 2011 S2-2 Activities in Focus Group on Smart Grid in ITU-T Tsuyoshi Masuo NTT Energy and Environment Systems Laboratories 7 March 2011 1 What is Focus Group? Focus Group(FG)

More information

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-8 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 8: frameworks

More information

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008 2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications

ISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications INTERNATIONAL STANDARD ISO/IEC 9594-5 Seventh edition 2014-03-01 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications Technologies de l'information Interconnexion

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information

More information

SC27 WG4 Mission. Security controls and services

SC27 WG4 Mission. Security controls and services copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fourth edition 2001-08-01 Information technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks Technologies de l'information

More information

ITU-T Z.100. Specification and Description Language Overview of SDL-2010

ITU-T Z.100. Specification and Description Language Overview of SDL-2010 International Telecommunication Union ITU-T Z.100 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (12/2011) SERIES Z: LANGUAGES AND GENERAL SOFTWARE ASPECTS FOR TELECOMMUNICATION SYSTEMS Formal description

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1159 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré

More information

Telebiometrics, and applications in Japan. Systems Development Lab. Hitachi, Ltd.

Telebiometrics, and applications in Japan. Systems Development Lab. Hitachi, Ltd. Telebiometrics, and applications in Japan Yoshiaki ISOBE Systems Development Lab. Hitachi, Ltd. yoshiaki.isobe.en@hitachi.com 2 Introduction Biometrics i is one of Authentication ti ti technologies Authentication

More information

ISO/IEC JTC 1/SC 27 N7769

ISO/IEC JTC 1/SC 27 N7769 ISO/IEC JTC 1/SC 27 N7769 REPLACES: N ISO/IEC JTC 1/SC 27 Information technology - Security techniques Secretariat: DIN, Germany DOC TYPE: officer's contribution TITLE: SC 27 Presentation to ITU-T Workshop

More information

Part 7: Selected object classes

Part 7: Selected object classes INTERNATIONAL STANDARD ISO/IEC 9594-7 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 7: Selected object classes Technologies de l information Interconnexion

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory: Procedures for distributed operation

ISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory: Procedures for distributed operation INTERNATIONAL STANDARD ISO/IEC 9594-4 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Procedures for distributed operation Technologies de l'information Interconnexion

More information

Part 5: Protocol specifications

Part 5: Protocol specifications INTERNATIONAL STANDARD ISO/IEC 9594-5 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications Technologies de l information Interconnexion

More information

Cyber Security in ICT Networks: CITEL Perspectives

Cyber Security in ICT Networks: CITEL Perspectives Cyber Security in ICT Networks: CITEL Perspectives Wayne Zeuch Rapporteur, Standards Coordination CITEL PCC.I OAS Hemispheric Workshop on Cyber Security Rio de Janeiro Brazil Nov 16-18 2009 ICT Networks

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1

ISO/IEC INTERNATIONAL STANDARD. Information technology ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1 INTERNATIONAL STANDARD ISO/IEC 8825-5 Third edition 2015-11-15 Information technology ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1 Technologies de l'information Règles de codage

More information

B C ISO/IEC 9595 INTERNATIONAL STANDARD. Information technology Open Systems Interconnection Common management information service

B C ISO/IEC 9595 INTERNATIONAL STANDARD. Information technology Open Systems Interconnection Common management information service INTERNATIONAL STANDARD ISO/IEC 9595 Third edition 1998-10-15 Information technology Open Systems Interconnection Common management information service Technologies de l'information Interconnexion de systèmes

More information

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

ITU-T SG 17 Q10/17. Trust Elevation Frameworks ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation INTERNATIONAL STANDARD ISO/IEC 8824-1 Fourth edition 2008-12-15 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Technologies de l'information Notation de syntaxe

More information

ISO/IEC Information technology Open Systems Interconnection The Directory. Part 9: Replication

ISO/IEC Information technology Open Systems Interconnection The Directory. Part 9: Replication INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-9 Seventh edition 2017-05 Information technology Open Systems Interconnection The Directory Part 9: Replication

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Message Handling Systems (MHS): MHS routing

ISO/IEC INTERNATIONAL STANDARD. Information technology Message Handling Systems (MHS): MHS routing INTERNATIONAL STANDARD ISO/IEC 10021-10 Second edition 1999-12-15 Information technology Message Handling Systems (MHS): MHS routing Technologies de l'information Systèmes de messagerie (MHS): Routage

More information

ISO/IEC Information technology Open Systems Interconnection The Directory: Protocol specifications

ISO/IEC Information technology Open Systems Interconnection The Directory: Protocol specifications This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 9594-5 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Protocol specifications

More information

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-7 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 7: Selected object classes Technologies de l information Interconnexion

More information

A Compatible Public Service Platform for Multi-Electronic Certification Authority

A Compatible Public Service Platform for Multi-Electronic Certification Authority Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,

More information

[30] Dong J., Lou j. and Yu L. (2003), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4

[30] Dong J., Lou j. and Yu L. (2003), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4 [30] Dong J., Lou j. and Yu L. (3), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4 Algorithm for Implementation of nine Intra Prediction Modes in MATLAB and

More information

Collaboration System using Agent based on MRA in Cloud

Collaboration System using Agent based on MRA in Cloud Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal

More information

ISO/IEC JTC 1 Study Group on Smart Cities

ISO/IEC JTC 1 Study Group on Smart Cities ANSI WORKSHOP ISO/IEC JTC 1 Study Group on Smart Cities Presented by Alex Tarpinian Senior Manager, IBM ANSI WORKSHOP: Smart and Sustainable Cities November 21, 2013 1 Overview ISO/IEC JTC 1 Study Group

More information

Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Telecommunication Standardization Bureau (TSB) Consultant

Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Telecommunication Standardization Bureau (TSB) Consultant Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Standardization Bureau (TSB) Consultant Moscow, 9-11 november 2011 Contents The benefits of conformity assessment Conformity

More information

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the

More information

Driving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU

Driving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU Driving Internet of Things (IoT) standardization to build smart sustainable cities Cristina Bueti, Adviser, ITU The world is Mobile broadband penetration globally is reaching 47% in 2015, a value that

More information

Cybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives

Cybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives Cybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives Wayne Zeuch Rapporteur: Standards, Conformance, and Interoperability CITEL PCC.I ITU /CITEL Regional Cybersecurity Workshop

More information

ISO/IEC JTC 1 N 13127

ISO/IEC JTC 1 N 13127 ISO/IEC JTC 1 N 13127 ISO/IEC JTC 1 Information technology Secretariat: ANSI (United States) Document type: Title: Status: Business Plan BUSINESS PLAN for JTC1/SC6, Telecommunications and Information Exchange

More information

ITU-T Y Next generation network evolution phase 1 Overview

ITU-T Y Next generation network evolution phase 1 Overview I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2340 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Dell EMC Elastic Cloud Storage v3.2 15 May 2018 383-4-439 V1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be altered,

More information

Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System

Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System National Conference on Information Technology and Computer Science (CITCS 2012) Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System WANG Tian

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN. INTERNATIONAL STANDARD ISO/IEC 8824-4 Fifth edition 2015-11-15 Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Technologies de l'information Notation

More information

PKCS #10 v1.7: Certification Request Syntax Standard (Final draft)

PKCS #10 v1.7: Certification Request Syntax Standard (Final draft) PKCS #10 v1.7: Certification Request Syntax Standard (Final draft) RSA Laboratories May 4 th, 2000 Editor s note: This is the final draft of PKCS #10 v1.7, which is available for a 14-day public review

More information

ISO/IEC Information technology Common Biometric Exchange Formats Framework Security block format specifications

ISO/IEC Information technology Common Biometric Exchange Formats Framework Security block format specifications INTERNATIONAL STANDARD ISO/IEC 19785-4 First edition 2010-08-15 Information technology Common Biometric Exchange Formats Framework Part 4: Security block format specifications Technologies de l'information

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Information object specification

ISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Information object specification INTERNATIONAL STANDARD ISO/IEC 8824-2 Fifth edition 2015-11-15 Information technology Abstract Syntax Notation One (ASN.1): Information object specification Technologies de l'information Notation de syntaxe

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

ISO/IEC This is a preview - click here to buy the full publication INTERNATIONAL STANDARD. Second edition

ISO/IEC This is a preview - click here to buy the full publication INTERNATIONAL STANDARD. Second edition This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 9834-1 Second edition 2005-07-15 Information technology Open Systems Interconnection Procedures for the operation

More information

Security Standardization and Regulation An Industry Perspective

Security Standardization and Regulation An Industry Perspective Security Standardization and Regulation An Industry Perspective Dr. Ralf Rammig Siemens AG Megatrends Challenges that are transforming our world Digitalization In the future, we ll be living in a world

More information

Part 5: Protocol specifications

Part 5: Protocol specifications INTERNATIONAL STANDARD ISO/IEC 9594-5 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications Technologies de l information Interconnexion

More information

An Overview of ISO/IEC family of Information Security Management System Standards

An Overview of ISO/IEC family of Information Security Management System Standards What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information

More information

Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li

Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li Applied Mechanics and Materials Submitted: 2014-08-05 ISSN: 1662-7482, Vols. 651-653, pp 1953-1957 Accepted: 2014-08-06 doi:10.4028/www.scientific.net/amm.651-653.1953 Online: 2014-09-30 2014 Trans Tech

More information

ASN.1 and the Connected Vehicle

ASN.1 and the Connected Vehicle ASN.1 and the Connected Vehicle Alessandro Triglia sandro@oss.com OSS Nokalva, Inc. 2 nd International Summit on the State of the Connected Vehicle Troy, MI 2010-09-30 ASN.1 ASN.1 = Abstract Syntax Notation

More information

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology 364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

IEEE Standards Activities in the Smart Grid Space (ICT Focus)

IEEE Standards Activities in the Smart Grid Space (ICT Focus) This document contains supplemental information referenced by the European Rolling Plan for ICT Standardisation IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview IEEE, through the

More information

Information technology Security techniques Code of practice for personally identifiable information protection

Information technology Security techniques Code of practice for personally identifiable information protection INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT EMC VPLEX v5.5 Version 1.0 11 May 2016 FOREWORD This certification report is an UNCLASSIFIED publication, issued under the authority of the Chief, Communications Security

More information

IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview

IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview This document contains supplemental information referenced by the European Rolling Plan for ICT Standardisation. IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview IEEE s standardization

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-10 Third edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Use of systems management for administration of the Directory Technologies

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Ixia NTO 7303 and Vision ONE v4.5.0.29 30 October 2017 383-4-409 1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be

More information

John Snare Chair Standards Australia Committee IT/12/4

John Snare Chair Standards Australia Committee IT/12/4 John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Dell Data Protection Encryption Personal Edition Version 8.14.0 383-4-416 2 October 2017 v1.1 Government of Canada. This document is the property of the Government

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT CA Privileged Access Manager Version 2.5.5 v1.2 8 August 2016 FOREWORD This certification report is an UNCLASSIFIED publication, issued under the authority of the Chief,

More information

TECHNICAL STANDARDS ASSESSMENT REPORT

TECHNICAL STANDARDS ASSESSMENT REPORT TECHNICAL STANDARDS ASSESSMENT REPORT 7/28/2018 Version 2.0, M. Ficken 1 Table of Contents 1 Table of Contents... 2 2 Scope... 3 2.1 ATMIA Next Gen Blueprint... 3 3 ASSESSMENT... 4 3.1 BIGGER PICTURE...

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

ICNDS International Conference on Networking and Digital Society. Volume - 2. Table of Contents. ICNDS 2009 Volume 2

ICNDS International Conference on Networking and Digital Society. Volume - 2. Table of Contents. ICNDS 2009 Volume 2 2009 International Conference on Networking and Digital Society ICNDS 2009 Table of Contents Volume - 2 Preface - Volume 2...x Organization - Volume 2...xi Reviewers - Volume 2...xii ICNDS 2009 Volume

More information

Electronic fee collection Information exchange between service provision and toll charging

Electronic fee collection Information exchange between service provision and toll charging Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO 12855 Second edition 2015-12-15 Electronic fee collection Information exchange between service provision and toll charging Perception du télépéage

More information

ITU-T X.282. Superseded by a more recent version. Amendment 2 (12/97)

ITU-T X.282. Superseded by a more recent version. Amendment 2 (12/97) INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.282 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Amendment 2 (12/97) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATION Open System Interconnection Layer

More information

Predstavenie štandardu ISO/IEC 27005

Predstavenie štandardu ISO/IEC 27005 PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY OSI networking and system aspects Abstract Syntax Notation One (ASN.

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY OSI networking and system aspects Abstract Syntax Notation One (ASN. I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.680 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (08/2015) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY

More information

ISO/IEC Information technology Open Systems Interconnection The Directory. Part 6: Selected attribute types

ISO/IEC Information technology Open Systems Interconnection The Directory. Part 6: Selected attribute types INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-6 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 6: Selected

More information

ISC2 EXAM - CISSP. Certified Information Systems Security Professional. Buy Full Product.

ISC2 EXAM - CISSP. Certified Information Systems Security Professional. Buy Full Product. ISC2 EXAM - CISSP Certified Information Systems Security Professional Buy Full Product http://www.examskey.com/cissp.html Examskey ISC2 CISSP exam demo product is here for you to test the quality of the

More information

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN 2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen

More information

CITEL s s Focus on Cybersecurity and Critical Infrastructure Protection CITEL

CITEL s s Focus on Cybersecurity and Critical Infrastructure Protection CITEL CITEL s s Focus on Cybersecurity and Critical Infrastructure Protection Wayne Zeuch CITEL (Alcatel-Lucent) ITU Regional Workshop on Frameworks for Cybersecurity and CIIP Buenos Aires, Argentina October

More information

Abstract. 1. Introduction

Abstract. 1. Introduction 보안공학연구논문지 제 권제 호 년 월 Abstract In these days, many organizations try to manage their information system in safe way(i.e., Evaluation, Assurance and Certification of Information Security) due to more rapidly

More information

Information technology MPEG systems technologies. Part 8: Coding-independent code points

Information technology MPEG systems technologies. Part 8: Coding-independent code points INTERNATIONAL STANDARD ISO/IEC 23001-8 Second edition 2016-05-01 Information technology MPEG systems technologies Part 8: Coding-independent code points Technologies de l information Technologies des systèmes

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Dell EMC Unity OE 4.2 383-4-421 22 September 2017 Version 1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be altered,

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation

More information

Work and Projects in ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy technologies

Work and Projects in ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy technologies Work and Projects in ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy technologies 30th Plenary meeting of the Consultative Committee of the Convention for the Protection of Individuals with Regard

More information

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair

Authentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair Authentication Work stream FIGI Security Infrastructure and Trust Working Group Abbie Barbir, Chair Security, Infrastructure, Trust Working Group To enhance confidence in using Digital Financial Services

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT EMC RecoverPoint v4.4 SP1 19 May 2016 FOREWORD This certification report is an UNCLASSIFIED publication, issued under the authority of the Chief, Communications Security

More information