Skip to main content

Security Standards Activities

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 81 Accesses

This article describes a number of highly visible security standards activities. It cannot be exhaustive, but it does include many standards bodies that are influencing the security industry and product development. Many of the standards are interrelated; for example, X.509 public key certificates have been profiled for use in the Internet by the PKIX working group of the Internet Engineering Task Force (IETF), and that profile has been augmented for Qualified Certificates, which are used to identify human beings involved in electronic commerce.

X.509

ITU-T Recommendation X.509 defines public key certificates and attribute certificates. ITU-T was previously known as CCITT, which has been developing telecommunications standards for decades. X.509 [40, 41] is part of a joint effort between ITU-T and the International Organization for Standardization (called ISO), which developed the X.500 series of standards. The documents have numbers assigned by both standards bodies, but the numbers...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. See http://www.3gpp2.org/

  2. Howes, T. and M. Smith (1997). LDAP: Programming Directory-Enabled Applications with Lightweight Directory Access Protocol. Macmillan Technical Publishing, Indianapolis.

    Google Scholar 

  3. See http://ice-car.darmstadt.gmd.de/ice-car-home.html

  4. See http://www.jcp.org/

  5. National Institute of Standards and Technology. Minimum Interperability Specification for PKI Components, Version 1, June 1997.

    Google Scholar 

  6. Yeong, W., T. Howes, and S. Kille (1995). Lightweight Directory Access Protocol. RFC 1777.

    Google Scholar 

  7. Dierks, T. and C. Allen (1999). The TLS Protocol Version 1.0. RFC 2246.

    Google Scholar 

  8. Wahl, M., T. Howes, and S. Kille (1997). Lightweight Directory Access Protocol (v3). RFC 2251.

    Google Scholar 

  9. Dusse, S., P. Hoffman, B. Ramsdell, L. Lundblade, and L. Repka (1998). S/MIME Version 2 Message Specification. RFC 2311.

    Google Scholar 

  10. Dusse, S., P. Hoffman, B. Ramsdell, and J. Weinstein (1998). S/MIME Version 2 Certificate Handling. RFC 2312.

    Google Scholar 

  11. Kent, S. and R. Atkinson (1998). IP Authentication Header. RFC 2402.

    Google Scholar 

  12. Kent, S. and R. Atkinson (1998). IP Encapsulating Security Payload (ESP). RFC 2406.

    Google Scholar 

  13. Harkins, D. and D. Carrel (1998). The Internet Key Exchange (IKE). RFC 2409.

    Google Scholar 

  14. Callas, J., L. Donnerhacke, H. Finney, and R. Thayer (1998). OpenPGP Message Format. RFC 2440.

    Google Scholar 

  15. Housley, R., W. Ford, W. Polk, and D. Solo (1999). Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459.

    Google Scholar 

  16. Adams, C. and S. Farrell (1999). Internet X.509. Public Key Infrastructure Certificate Management Protocols. RFC 2510.

    Google Scholar 

  17. Chokhani, S. and W. Ford (1999). Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. RFC 2527.

    Google Scholar 

  18. Boeyen, S., T. Howes, and P. Richard (1999). Internet X.509 Public Key Infrastructure Operational Protocols—LDAPv2. RFC 2559.

    Google Scholar 

  19. Myers, M., R. Ankney, A. Malpani, S. Galperin, and C. Adams (1999). X.509 Internet Public Key Infrastructure Online Certificate Status Protocol—OCSP. RFC 2560.

    Google Scholar 

  20. Housley, R. and P. Hoffman (1999). Internet X.509 Public Key Infrastructure Operational Protocols: FTP and HTTP. RFC 2585.

    Google Scholar 

  21. Boeyen, S., T. Howes, and P. Richard (1999). Internet X.509 Public Key Infrastructure LDAPv2 Schema. RFC 2587.

    Google Scholar 

  22. Housley, R. (1999). Cryptographic Message Syntax. RFC 2630.

    Google Scholar 

  23. Rescorla, E. (1999). Diffie-Hellman Key Agreement Method. RFC 2631.

    Google Scholar 

  24. Ramsdell, B. (ed.). (1999). S/MIME Version 3 Certificate Handling. RFC 2632.

    Google Scholar 

  25. Ramsdell, B. (ed.). (1999). S/MIME Version 3 Message Specification. RFC 2633.

    Google Scholar 

  26. Hoffman, P. (ed.). (1999). Enhanced Security Services for S/MIME. RFC 2634.

    Google Scholar 

  27. Ellison, C. (1999). SPKI Requirements. RFC 2692.

    Google Scholar 

  28. Ellison, C., B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen (1999). SPKI Certificate Theory. RFC 2693.

    Google Scholar 

  29. Myers, M., X. Liu, J. Schaad, and J. Weinstein (2000). Certificate Management Messages over CMS. RFC 2797.

    Google Scholar 

  30. Rigney, C., S. Willens, A. Rubens, and W. Simpson (2000). Remote Authentication Dial in User Service (RADIUS). RFC 2865.

    Google Scholar 

  31. Rigney, C. (2000). RADIUS Accounting. RFC 2866.

    Google Scholar 

  32. Rigney, C., W. Willats, and P. Calhoun (2000). RADIUS Extensions. RFC 2869.

    Google Scholar 

  33. Mitton, D. (2000). Network Access Servers Requirements: Extended RADIUS Practices. RFC 2882.

    Google Scholar 

  34. Santesson, S., W. Polk, P. Barzin, and M. Nystrom (2001). Internet X.509 Public Key Infrastructure Qualified Certificates Profile. RFC 3039.

    Google Scholar 

  35. Mitton, D., M. St.Johns, S. Barkley, D. Nelson, B. Patil, M. Stevens, and B. Wolff (2001). Authentication, Authorization, and Accounting: Protocol Evaluation. RFC 3127.

    Google Scholar 

  36. Adams, C., P. Cain, D. Pinkas, and R. Zuccherato (2001). Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). RFC 3161.

    Google Scholar 

  37. Housley, R., W. Polk, W. Ford, and D. Solo (2002). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280.

    Google Scholar 

  38. Farrell, S. and R. Housley (2002). An Internet Attribute Certificate Profile for Authorization. RFC 3281.

    Google Scholar 

  39. Yergeau, F. (1998). UTF-8, a Transformation Format of ISO 10646. RFC 2279.

    Google Scholar 

  40. ITU-T. (1997). Recommendation X.509: The Directory—Authentication Framework.

    Google Scholar 

  41. ITU-T. (2000). Recommendation X.509: The Directory—Public Key and Attribute Certificate Frameworks.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Housley, R. (2005). Security Standards Activities. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_379

Download citation

Publish with us

Policies and ethics