Editor(s) Contributors Acronym Title. Technical Report on the successful use of security standards. Abbie Barbir. Trust elevation protocol
|
|
- Blaise Bates
- 6 years ago
- Views:
Transcription
1 - 1 - Acknowledging the active involvement of SG17 editors and contributors to the development of SG17 deliverables in Study Period (14 23 March 2016) Abbie Barbir Abbie Barbir, Abbie Barbir, Alexey Koshka Bo Yu, Jie Yuan, Chen Zhang Byoung-Moon Chin, Vibha Tomar Cai Chen, Yiwen Wang Chang Oh Kim, Wataru Senga Changjin Lee, Deawoo Park, Damir Rajnovic X.TRsuss*** X.te X.1254rev* X.nessa* X.ticsc** X.samtn* X.sgsm X.gcspi** Z.161 Technical Report on the successful use of security standards Trust elevation protocol Entity authentication assurance framework Access control models for incidents exchange networks ITU-T X.1245 Supplement on Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE Security assessment techniques in telecommunication/ict networks ICT Security Standards Roadmap Information security management guidelines for small and medium telecommunication organizations ITU-T X.1242 Supplement on Guidelines on countermeasures against short message service (SMS) phishing and smishing attack X.1521 Common vulnerability scoring system 3.0 Z Z Z Z TTCN-3 core language TTCN-3 language extensions: Support of interfaces with continuous signals TTCN-3 language extensions: Configuration and deployment support TTCN-3 language extensions: Advanced parameterization TTCN-3 language extensions: Behaviour types
2 - 2 - Z Z.164 Z.165 Z Z.166 Z.167 Z.168 Z.169 Z.170 Dongxin Liu, Hongwei Luo, Laifu Wang Eric Andersen, Michele Peiry X.sgmvno** X.pbact* X.509 Cor.2 X.500 X.501 X.509 X.511 X.518 X.519 TTCN-3 language extensions: Performance and real time testing TTCN-3 operational semantics TTCN-3 runtime interface (TRI) TTCN-3 extension package: Extended TRI TTCN-3 control interface (TCI) Using ASN.1 with TTCN-3 The IDL to TTCN-3 mapping Using XML schema with TTCN-3 TTCN-3 documentation comment specification ITU-T X.805 Supplement on Security guideline for mobile virtual network operator (MVNO) Privacy-based access control in telebiometrics Interconnection The Directory: Public-key and attribute certificate frameworks Technical Corrigendum 2 Interconnection The Directory: Overview of concepts, models and services Interconnection The Directory Models Interconnection The Directory Public-key and attribute certificate frameworks Interconnection The Directory Abstract service definition Interconnection The Directory Procedures for distributed operations Interconnection The Directory Protocol specifications
3 - 3 - Feng Gao, Laifu Wang, Annan Zhu Gao Feng, Haitao Du, Feng Zhang, Liang Wei Hirotaka Yoshida Hongwei Luo, Laifu Wang Huamin Jin, Laifu Wang, Mengxi Wang, Shuai Wang Huamin Jin, Shuai Wang, Hyoungshick Kim, JungSoo Park Hyungjin Lim, Jongyoul Park, Ik-Kyun Kim, Jong-Hyun Kim X.520 X.521 X.525 X.pki-em X.pki-prof X.1247 X.websec-6 X.voLTEsec-1 X.tigsc X.iotsec-1* X.tfcma* X.SRIaaS* X.cspim* X.sdnsec-1* X.websec-7 X.1542 (X.simef)* Interconnection The Directory Selected attribute types Interconnection The Directory Selected object classes Interconnection The Directory Replication Information technology Public-Key Infrastructure: Establishment and maintenance Information technology Public-Key Infrastructure: Profile Technical framework for countering mobile messaging spam Security framework and requirements for open capabilities of telecommunication services Security framework for voice-over-long-termevolution (VoLTE) network operation Technical implementation guidelines for ITU-T X.805 Simple encryption procedure for Internet of Things (IoT) environments Technical framework for countering mobile inapplication advertising spam Security requirements of public infrastructure as a service (IaaS) in cloud computing Technical requirements for countering instant messaging spam (SPIM) Security services using the software-defined networking Reference monitor for online analytics services Session information message exchange format
4 - 4 -, Bo Yu Jason Kim, Nak Hyun Kim, Yong Nyuo Shin Jean-Paul Lemaire Jun Seob Lee Bo Yu Kepeng Li, Feng Zhang Koji Nakao Kyeong Hee Oh, Wataru Senga Jae-Nam Ko,, Seung-Woo Yu Min Zuo Liu Lijun, Chen Zhang Masashi Eto, Koji Nakao X.sbb* X.tam X.894 (X.cms) X.oiddev X.1033 (X.gsiiso) X.msec-9* X.salcm X.sotavsu** X.1051rev X.sup-gpim** X.1256 X.msec-11* X.itssec-1* Security capability requirements for countering smartphone-based botnets A guideline to technical and operational countermeasures for telebiometric applications using mobile devices Information technology Generic applications of ASN.1 Cryptographic Message Syntax Information technology Use of object identifiers in the Internet of Things Guidelines on security of the individual information service provided by the operators Functional security requirements and architecture for mobile phone anti-theft measures Security reference architecture for lifecycle management of e-commerce business data Non-normative document Secure Over-the-Air Vehicle Software Updates Operational and Functional Requirements Information technology Security techniques Code of practice for Information security controls based on ISO/IEC for telecommunications organizations ITU-T X.gpim Supplement on Code of practice for personally identifiable information protection for telecommunications organizations Guidelines and framework for sharing network authentication results with service applications Guidelines on mitigating the negative effects of infected terminals in mobile networks Secure software update capability for intelligent transportation system communication devices Michele Peiry X.th2* Telebiometrics related to physics Michele Peiry X.th3* Telebiometrics related to chemistry Mijoo Kim, Jeong-Jun Suh, Mi Yeon Yoon X.Suppl.26 (X.sgsec-1)** Supplement 26 to ITU-T X-series Recommendations ITU-T X.1111 Supplement on security functional architecture for smart grid services using telecommunication networks
5 - 5 - Ming Feng, Jun Shen, Huirong Tian, Laifu Wang Myung Geun Chun, Jason Kim, Yong Nyuo Shin Nan Meng, Wei Liang Olivier Vuillemin Paul E. Thorpe X.1642 X.bhsm X.1641 (X.CSCDataSec)* X.th13 X.jsoner Guidelines for the operational security of cloud computing Information technology Security Techniques Telebiometric authentication framework using biometric hardware security module Guidelines for cloud service customer data security Holosphere to biosphere secure data acquisition and telecommunication protocol Information technology ASN.1 encoding rules: Specification of Javascript Object Notation (JSON) Encoding Rules (JSON/ER) Paul Gerome X.th4* Telebiometrics related to biology Paul Gerome X.th5* Telebiometrics related to culturology Paul Gerome X.th6* Telebiometrics related to psychology Radu Marian X.1257 Identity and access management taxonomy Richard Anago, Anfana Traore X.sup-gisb** Z.Imp100 Note (2) Z.100 Z.101 Z.102 Z.103 Z.104 Z.105 Z.106 Z.107 Z.111 ITU-T X.1054 Supplement on Best practice for implementation of Rec. ITU-T X.1054 ISO /IEC on governance of information security Case of Burkina Faso Specification and Description Language implementer's guide - Version of SDL-2010 Specification and Description Language - Basic SDL-2010 Specification and Description Language - Comprehensive SDL-2010 Specification and Description Language - Shorthand notation and annotation in SDL-2010 Specification and Description Language - Data and action language in SDL-2010 Specification and Description Language - SDL combined with ASN.1 modules Specification and Description Language - Common interchange format for SDL-2010 Specification and Description Language - Objectoriented data in SDL-2010 Notations and guidelines for the definition of ITU-T languages
6 - 6 - Z.100 Annex F1 Z.100 Annex F2 Z.100 Annex F3 Z.109 Z.151 Sandor Mazgon Sang-Woo Lee, Jae-Hoon Nah Soonjoung Byun, Tae Kyung Kim, Tae-Jin Lee, Jeong-Jun Suh Woong Go, Haeryong Park, Jeong-Jun Suh Xia Junjie, Kadobayashi Kadobayashi Kadobayashi, Daisuke Miyamoto X.itssec-2* X.gpim* X.1258 (X.eaaa)* X.Suppl.25 (X.gcsfmpd)** X.sgsec-2* X.iotsec-2* X.1500 Amd.9 X.1500 Amd.10*** X.cogent* of SDL SDL formal definition: General overview of SDL SDL formal definition: Static semantics of SDL SDL formal definition: Dynamic semantics Specification and Description Language - Unified modeling language profile for SDL-2010 User Requirements Notation (URN) - Language definition Security Compendia Security guidelines for V2X communication systems Information technology Security techniques Code of practice for Personally Identifiable Information protection Enhanced entity authentication based on aggregated attributes Supplement 25 to ITU-T X-series Recommendations ITU-T X.1231 Supplement on guidance to assist in countering spam for mobile phone developers Security guidelines for home area network (HAN) devices in smart grid systems Security framework for Internet of Things Overview of cybersecurity information exchange Amendment 9 Revised structured cybersecurity information exchange techniques Overview of cybersecurity information exchange Amendment 10 Revised structured cybersecurity information exchange techniques Design considerations for improved end-user perception of trustworthiness indicators
7 - 7 - Kadobayashi, Daisuke Miyamoto Dongya Wu Jae Hoon Nah Ruoni Wang, Peng Zhao Zhiyuan Hu, Min Shu, Ye Tao, Ni Zhang Zhiyuan Hu, Ye Tao X.metric* X.oid-iot** X.websec-8 X.1602 X.dsms* X.sdnsec-2 Metrics for evaluating threat and resilience in cyberspace ITU-T X.660 Supplement on Guidelines for using object identifiers for the Internet of Things Secure protection guidelines of value-added service for operators Security requirements for software as a service application environments Data security requirements for the monitoring service of cloud computing Security requirements and reference architecture for Software-Defined Networking
- 1 - X.ticsc. X.samtn. ICT Security Standards Roadmap Information security management guidelines for small and medium telecommunication organizations
- 1 - Acknowledging the active involvement of SG17 editors and contributors to the development of SG17 deliverables in Study Period 2013-2016 (8 17 September 2015) Abbie Barbir Alexey Koshka Bo Yu, Jie
More informationStudy Group 17 (Security) ITU Sector of Standardiza9on (ITU-T)
Study Group 17 (Security) ITU Sector of Standardiza9on (ITU-T) Vasily Dolmatov ITU-T Study Group 17 Overview Primary focus is to build confidence and security in the use of Informa6on and Communica6on
More informationITU-T SG 17 Achievements in ICT Security Standardization
ITU-T SG 17 Achievements in ICT Security Standardization Arkadiy Kremer (Chairman, ITU-T Study Group 17) kremer@rans.ru 6th ETSI SECURITY WORKSHOP, 19.01.2011 1/15 Topics ITU Plenipotentiary Conference
More informationPrivacy Security IdM Trust Observations from ITU T Study Group 17
Privacy Security IdM Trust Observations from ITU T Study Group 17 ETSI Security Week Security Workshop Session 3: Security in other Standards and Industry Forums Strategic overviews stress on Privacy work
More informationSecurity Standardization
ISO-ITU ITU Cooperation on Security Standardization Dr. Walter Fumy Chairman ISO/IEC JTC 1/SC 27 Chief Scientist, Bundesdruckerei GmbH, Germany 7th ETSI Security Workshop - Sophia Antipolis, January 2012
More information5G security activities and future plan in ITU-T SG17
5G security activities and future plan in ITU-T SG17 Heung Youl Youm, PhD Chairman, ITU-T SG17 Professor, Soonchunhyang University, Korea(Rep. of) Content Strategic Vision for ITU-T SG17 Overview of 5G
More informationIntroduction of ITU-T Study Group 17 Security for ITS perspective
Introduction of ITU-T Study Group 17 Security for ITS perspective (Primary focus in SG17 is to build confidence and security in the use of Information and Communication Technologies (ICTs)) July 29, 2015
More informationInformation Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community
Information Security Management Systems Standards ISO/IEC 27001 Global Opportunity for the Business Community Prof. Edward (Ted) Humphreys IPA Global Symposium 2013 23 rd May 2013, Tokyo, Japan CyberSecurity
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 27017 First edition 2015-12-15 Information technology Security techniques Code of practice for information security
More informationSERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Series X Supplement 31 (09/2017) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information
More informationSC27 WG4 Mission. Security controls and services
copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information
More informationInformation technology Security techniques Telebiometric authentication framework using biometric hardware security module
INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information
More informationITU-T Standardization on Countering Spam
Joint Internet Society, CITEL and ITU Workshop on Combating SPAM (Mendoza, Argentina, 7 October 2013) ITU-T Standardization on Countering Spam Sergio Scarabino Area Representative sergio.scarabino@itu.int
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-8 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 8: frameworks
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Fourth edition 2001-08-01 Information technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks Technologies de l'information
More informationSecure Development Lifecycle
Secure Development Lifecycle Strengthening Cisco Products The Cisco Secure Development Lifecycle (SDL) is a repeatable and measurable process designed to increase Cisco product resiliency and trustworthiness.
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques
More informationFeatured Articles II Security Research and Development Research and Development of Advanced Security Technology
364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications
INTERNATIONAL STANDARD ISO/IEC 9594-5 Seventh edition 2014-03-01 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications Technologies de l'information Interconnexion
More informationVerasys Enterprise Security and IT Guide
Verasys Enterprise Johnson Controls Milwaukee WI, USA www.verasyscontrols.com LIT-12013026 March 2018 Contents Introduction... 3 Microsoft Azure security and privacy... 5 Security... 5 Privacy...5 Compliance...5
More informationstandards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in
ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the
More informationITU-T SG 17 Q10/17. Trust Elevation Frameworks
ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents
More informationISO/IEC INTERNATIONAL STANDARD. Information technology ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1
INTERNATIONAL STANDARD ISO/IEC 8825-5 Third edition 2015-11-15 Information technology ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1 Technologies de l'information Règles de codage
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationNational Institute of Standards and Technology
National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationIoT privacy risk management in ANASTACIA project
ANASTACIA has received funding from the European Union s Horizon 2020 Research and Innovation Programme under Grant Agreement N 731558 and from the Swiss State Secretariat for Education, Research and Innovation.
More informationDeploying Access Control using Extended XACML in Open Web Service Environment
Deploying Access Control using Extended XACML in Open Web Service Environment Thirumaran.M Pondicherry Engg College Dhavachelvan.P Pondicherry University Divya.A Pondicherry Engg College ABSTRACT Now a
More informationKey Security Issues for implementation of Digital Currency, including ITU-T SG17 activities
ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré
More informationS2-2 Activities in Focus Group on Smart Grid in ITU-T
TTC Workshop on EMC Standardization 2011 S2-2 Activities in Focus Group on Smart Grid in ITU-T Tsuyoshi Masuo NTT Energy and Environment Systems Laboratories 7 March 2011 1 What is Focus Group? Focus Group(FG)
More informationISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données
INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004
More informationSERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1159 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY
More informationPart 5: Protocol specifications
INTERNATIONAL STANDARD ISO/IEC 9594-5 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications Technologies de l information Interconnexion
More information2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008
2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More information[NEC Group Internal Use Only] IoT Security. - Challenges & Standardization status. Sivabalan Arumugam.
[NEC Group Internal Use Only] IoT Security - Challenges & Standardization status Sivabalan Arumugam Outline IoT Security Overview IoT Security Challenges IoT related Threats
More informationPart 7: Selected object classes
INTERNATIONAL STANDARD ISO/IEC 9594-7 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 7: Selected object classes Technologies de l information Interconnexion
More informationEPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use
EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission
More informationCritical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level
Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration
More informationCLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist
CLOUD SECURITY SPECIALIST Certification Cloud Security The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms,
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.
INTERNATIONAL STANDARD ISO/IEC 8824-4 Fifth edition 2015-11-15 Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Technologies de l'information Notation
More informationISO/IEC Information technology Open Systems Interconnection The Directory: Protocol specifications
This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 9594-5 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Protocol specifications
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Information object specification
INTERNATIONAL STANDARD ISO/IEC 8824-2 Fifth edition 2015-11-15 Information technology Abstract Syntax Notation One (ASN.1): Information object specification Technologies de l'information Notation de syntaxe
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory: Procedures for distributed operation
INTERNATIONAL STANDARD ISO/IEC 9594-4 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Procedures for distributed operation Technologies de l'information Interconnexion
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization
More informationSupply Chain Integrity and Security Assurance for ICT. Mats Nilsson
Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print
More informationDriving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU
Driving Internet of Things (IoT) standardization to build smart sustainable cities Cristina Bueti, Adviser, ITU The world is Mobile broadband penetration globally is reaching 47% in 2015, a value that
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation
INTERNATIONAL STANDARD ISO/IEC 8824-1 Fourth edition 2008-12-15 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Technologies de l'information Notation de syntaxe
More informationB C ISO/IEC 9595 INTERNATIONAL STANDARD. Information technology Open Systems Interconnection Common management information service
INTERNATIONAL STANDARD ISO/IEC 9595 Third edition 1998-10-15 Information technology Open Systems Interconnection Common management information service Technologies de l'information Interconnexion de systèmes
More informationCyber Security in ICT Networks: CITEL Perspectives
Cyber Security in ICT Networks: CITEL Perspectives Wayne Zeuch Rapporteur, Standards Coordination CITEL PCC.I OAS Hemispheric Workshop on Cyber Security Rio de Janeiro Brazil Nov 16-18 2009 ICT Networks
More informationElectronic fee collection Information exchange between service provision and toll charging
Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO 12855 Second edition 2015-12-15 Electronic fee collection Information exchange between service provision and toll charging Perception du télépéage
More informationResearch and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen
More informationCollaboration System using Agent based on MRA in Cloud
Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal
More information5G Revolution & Service security in Korea
5G Revolution & Service security in Korea 2018.03.19. Jae Hoon Nah 5G Standardization timeline Standards development & deployment Source: IHS 2 Usage scenario for 5G (ITU-R) 3 Potential opportunities of
More informationA Compatible Public Service Platform for Multi-Electronic Certification Authority
Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,
More informationISC2 EXAM - CISSP. Certified Information Systems Security Professional. Buy Full Product.
ISC2 EXAM - CISSP Certified Information Systems Security Professional Buy Full Product http://www.examskey.com/cissp.html Examskey ISC2 CISSP exam demo product is here for you to test the quality of the
More informationSERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Information and network security Network security
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1040 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2017) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationSecure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions
Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions April 26, 2018 The Secure Technology Alliance IoT Security Council is pleased to submit our response to
More informationStudy on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li
Applied Mechanics and Materials Submitted: 2014-08-05 ISSN: 1662-7482, Vols. 651-653, pp 1953-1957 Accepted: 2014-08-06 doi:10.4028/www.scientific.net/amm.651-653.1953 Online: 2014-09-30 2014 Trans Tech
More informationITU-T Z.100. Specification and Description Language Overview of SDL-2010
International Telecommunication Union ITU-T Z.100 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (12/2011) SERIES Z: LANGUAGES AND GENERAL SOFTWARE ASPECTS FOR TELECOMMUNICATION SYSTEMS Formal description
More informationHow do you decide what s best for you?
How do you decide what s best for you? Experience Transparency Leadership Commitment Cost reduction Security Trustworthiness Credibility Confidence Reliability Compliance Privacy Expertise Flexibility
More informationISO/IEC Information technology Open Systems Interconnection The Directory. Part 9: Replication
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-9 Seventh edition 2017-05 Information technology Open Systems Interconnection The Directory Part 9: Replication
More informationSERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY OSI networking and system aspects Abstract Syntax Notation One (ASN.
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.680 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (08/2015) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY
More informationInformation technology MPEG systems technologies. Part 8: Coding-independent code points
INTERNATIONAL STANDARD ISO/IEC 23001-8 Second edition 2016-05-01 Information technology MPEG systems technologies Part 8: Coding-independent code points Technologies de l information Technologies des systèmes
More informationDigital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria
Digital Healthcare Yordan Iliev Director R&D Healthcare Regional Cybersecurity Forum, 29-30 November 2016, Grand Hotel Sofia, Bulgaria AGENDA Introduction Security challenges in healthcare IT Change ahead
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Message Handling Systems (MHS): MHS routing
INTERNATIONAL STANDARD ISO/IEC 10021-10 Second edition 1999-12-15 Information technology Message Handling Systems (MHS): MHS routing Technologies de l'information Systèmes de messagerie (MHS): Routage
More informationISO/IEC JTC 1 N 13127
ISO/IEC JTC 1 N 13127 ISO/IEC JTC 1 Information technology Secretariat: ANSI (United States) Document type: Title: Status: Business Plan BUSINESS PLAN for JTC1/SC6, Telecommunications and Information Exchange
More informationISO/IEC Information technology Common Biometric Exchange Formats Framework Security block format specifications
INTERNATIONAL STANDARD ISO/IEC 19785-4 First edition 2010-08-15 Information technology Common Biometric Exchange Formats Framework Part 4: Security block format specifications Technologies de l'information
More informationSDN-Based Network Security Functions for VoIP and VoLTE Services
SDN-Based Network Security Functions for VoIP and VoLTE Services Daeyoung Hyun, Jinyoug Kim, Jaehoon (Paul) Jeong, Hyoungshick Kim, Jungsoo Park, and Taejin Ahn Department of Software, Sungkyunkwan University,
More informationISO/IEC This is a preview - click here to buy the full publication INTERNATIONAL STANDARD. Second edition
This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 9834-1 Second edition 2005-07-15 Information technology Open Systems Interconnection Procedures for the operation
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-7 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 7: Selected object classes Technologies de l information Interconnexion
More informationTelematics Transport Gateway for Telematics Systems. Independent on Mobile Networks
Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,
More informationTelebiometrics, and applications in Japan. Systems Development Lab. Hitachi, Ltd.
Telebiometrics, and applications in Japan Yoshiaki ISOBE Systems Development Lab. Hitachi, Ltd. yoshiaki.isobe.en@hitachi.com 2 Introduction Biometrics i is one of Authentication ti ti technologies Authentication
More informationASN.1 and the Connected Vehicle
ASN.1 and the Connected Vehicle Alessandro Triglia sandro@oss.com OSS Nokalva, Inc. 2 nd International Summit on the State of the Connected Vehicle Troy, MI 2010-09-30 ASN.1 ASN.1 = Abstract Syntax Notation
More informationOverview of the ISO/IEC Project
Overview of the ISO/IEC 30107 Project Anti-Spoofing and Liveness Detection Techniques Elaine Newton, PhD NIST elaine.newton@nist.gov 1-301-975-2532 1 Authentication Use Case For law enforcement, immigration,
More informationИтоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан)
Итоги регионального семинара МСЭ «Умные устойчивые города и сообщества» (1-2 июня 2017, Самарканд, Узбекистан) Фарид Нахли, координатор программ, Региональный офис МСЭ 1 Санкт-Петербург, 19-20 июня 2017
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 27011 First edition 2008-12-15 Information technology Security techniques Information security management guidelines for telecommunications organizations based on ISO/IEC
More informationIoT & SCADA Cyber Security Services
RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au
More informationand Registration Authorities
Introduction to Object Identifiers (OIDs) and Introduction Registration to Authorities Object Identifiers (OIDs) and Registration Authorities France Telecom Orange Olivier Dubuisson 7 March 2011 Many approaches
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 23009-1 First edition 2012-04-01 Information technology Dynamic adaptive streaming over HTTP (DASH) Part 1: Media presentation description and segment formats Technologies
More informationPKCS #10 v1.7: Certification Request Syntax Standard (Final draft)
PKCS #10 v1.7: Certification Request Syntax Standard (Final draft) RSA Laboratories May 4 th, 2000 Editor s note: This is the final draft of PKCS #10 v1.7, which is available for a 14-day public review
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation
More informationApplying Context to Web Authentication
Applying Context to Web Authentication John Linn, Burt Kaliski, and Moti Yung, RSA Laboratories; Magnus Nyström, RSA Security Inc. Prepared for W3C Workshop on Transparency and Usability of Web Authentication,
More informationCybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives
Cybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives Wayne Zeuch Rapporteur: Standards, Conformance, and Interoperability CITEL PCC.I ITU /CITEL Regional Cybersecurity Workshop
More informationWorldwide Standards and Regulations
Worldwide Standards and Regulations Henry Wong Chief Technologist E 3 HS IT Consulting, LLC Copyright 1988 2016 Standard Performance Evaluation Corporation (SPEC). All rights reserved. JTC1 SC39 WG1 Convenor
More informationImplementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System
National Conference on Information Technology and Computer Science (CITCS 2012) Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System WANG Tian
More informationBrussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security
Cyber Resiliency Minimizing the impact of breaches on business continuity Jean-Michel Lamby Associate Partner - IBM Security Brussels Think Brussels / Cyber Resiliency / Oct 4, 2018 / 2018 IBM Corporation
More informationSecurity in Power System Automation Status and Application of IEC Steffen Fries, Siemens Corporate Technology, June 13 th, 2017
Security in Power System Automation Status and Application of IEC 62351 Steffen Fries, Siemens Corporate Technology, June 13 th, 2017 Operator Integrator Vendor IEC 62351-10 Power Systems Security Architecture
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More informationChallenges in Developing National Cyber Security Policy Frameworks
Challenges in Developing National Cyber Security Policy Frameworks Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection William McCrum Deputy Director General
More information