Road of IT Security Standard

In 1977, security standardization activities began with the encryption algorithm, followed by the development of a number of important standards in the technical areas of authentication, security evaluation, and information security management systems, for example. They then contributed greatly to m...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Denshi Jouhou Tsuushin Gakkai Kiso, Kyoukai Sosaieti fundamentals review Kyoukai Sosaieti fundamentals review, 2013-01, Vol.7 (1), p.51-59
1. Verfasser: Takaragi, Kazuo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In 1977, security standardization activities began with the encryption algorithm, followed by the development of a number of important standards in the technical areas of authentication, security evaluation, and information security management systems, for example. They then contributed greatly to maintaining practical security as ICT applications spread all over the world. The evolution will further progress into the recent cloud computing and M2M, where, functional encryption, functional safety & security, tamper-free properties, and physical unclonable functions, are likely to be developed as important factors in security standards. This paper focuses on the trend of these standardizations.
ISSN:1882-0875
DOI:10.1587/essfr.7.51