Road of IT Security Standard
In 1977, security standardization activities began with the encryption algorithm, followed by the development of a number of important standards in the technical areas of authentication, security evaluation, and information security management systems, for example. They then contributed greatly to m...
Gespeichert in:
Veröffentlicht in: | Denshi Jouhou Tsuushin Gakkai Kiso, Kyoukai Sosaieti fundamentals review Kyoukai Sosaieti fundamentals review, 2013-01, Vol.7 (1), p.51-59 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In 1977, security standardization activities began with the encryption algorithm, followed by the development of a number of important standards in the technical areas of authentication, security evaluation, and information security management systems, for example. They then contributed greatly to maintaining practical security as ICT applications spread all over the world. The evolution will further progress into the recent cloud computing and M2M, where, functional encryption, functional safety & security, tamper-free properties, and physical unclonable functions, are likely to be developed as important factors in security standards. This paper focuses on the trend of these standardizations. |
---|---|
ISSN: | 1882-0875 |
DOI: | 10.1587/essfr.7.51 |