Skip to main content

Security Standards Activities

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 109 Accesses

Definition

A security standard defines a set of features that provide one or more security service, including data integrity, authentication, non-repudiation, data confidentiality, and access control. Some security standards are embedded within a data protocol, others are defined separately for use with many different data protocols, and still others define infrastructure.

Background

This entry describes a number of highly visible security standards activities. It cannot be exhaustive, but it does include many standards bodies that are influencing the security industry and product development. Many of the standards are interrelated; for example, X.509 public-key certificates have been profiled for use in the Internet by the PKIX working group of the Internet Engineering Task Force (IETF), and that profile has been augmented for Qualified Certificates, which are used to identify human beings involved in electronic commerce.

Activities

X.509

ITU-T Recommendation X.509 defines public-key certificates...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. ITU-T (1997) Recommendation X.509: The Directory—Authentication Framework

    Google Scholar 

  2. ITU-T (2000) Recommendation X.509: The Directory—Public Key and Attribute Certificate Frameworks

    Google Scholar 

  3. Housley R, Ford W, Polk W, Solo D (1999) Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459

    Google Scholar 

  4. Housley R, Polk W, Ford W, Solo D (2002) Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280

    Google Scholar 

  5. Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280

    Google Scholar 

  6. Yergeau F (1998) UTF-8, a Transformation Format of ISO 10646. RFC 2279

    Google Scholar 

  7. Santesson S, Polk W, Barzin P, Nystrom M (2001) Internet X.509 Public Key Infrastructure Qualified Certificates Profile. RFC 3039

    Google Scholar 

  8. Santesson S, Nystrom M, Polk W (2004) Internet X.509 Public Key Infrastructure Qualified Certificates Profile. RFC 3739

    Google Scholar 

  9. Farrell S, Housley R (2002) An Internet Attribute Certificate Profile for Authorization. RFC 3281

    Google Scholar 

  10. Adams C, Farrell S (1999) Internet X.509. Public Key Infrastructure Certificate Management Protocols. RFC 2510

    Google Scholar 

  11. Myers M, Liu X, Schaad J, Weinstein J (2000) Certificate Management Messages over CMS. RFC 2797

    Google Scholar 

  12. Adams C, Farrell S, Kause T, Mononen T (2005) Internet X.509. Public Key Infrastructure Certificate Management Protocol (CMP). RFC 4210

    Google Scholar 

  13. Schaad J, Myers M (2008) Certificate Management Messages over CMS (CMC). RFC 5272

    Google Scholar 

  14. Housley R, Hoffman P (1999) Internet X.509 Public Key Infrastructure Operational Protocols: FTP and HTTP. RFC 2585

    Google Scholar 

  15. Gutmann P (2006) Internet X.509 Public Key Infrastructure Operational Protocols: Certificate Store Access via HTTP. RFC 4387

    Google Scholar 

  16. Boeyen S, Howes T, Richard P (1999) Internet X.509 Public Key Infrastructure Operational Protocols—LDAPv2. RFC 2559

    Google Scholar 

  17. Boeyen S, Howes T, Richard P (1999) Internet X.509 Public Key Infrastructure LDAPv2 Schema. RFC 2587

    Google Scholar 

  18. Myers M, Ankney R, Malpani A, Galperin S, Adams C (1999) X.509 Internet Public Key Infrastructure Online Certificate Status Protocol—OCSP. RFC 2560

    Google Scholar 

  19. Chokhani S, Ford W (1999) Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. RFC 2527

    Google Scholar 

  20. Chokhani SW. Ford, Sabett R, Merrill C, Wu S (2003) Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. RFC 3647

    Google Scholar 

  21. Adams C, Cain P, Pinkas D, Zuccherato R (2001) Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). RFC 3161

    Google Scholar 

  22. Howes T, Smith M (1997) LDAP: Programming Directory-Enabled Applications with Lightweight Directory Access Protocol. Macmillan Technical Publishing, Indianapolis

    Google Scholar 

  23. Yeong W, Howes T, Kille S (1995) Lightweight Directory Access Protocol. RFC 1777

    Google Scholar 

  24. Wahl M, Howes T, Kille S (1997) Lightweight Directory Access Protocol (v3). RFC 2251

    Google Scholar 

  25. Zeilenga K (2006) Lightweight Directory Access Protocol (LDAP) Schema Definitions for X.509 Certificates. RFC 4523

    Google Scholar 

  26. Dusse S, Hoffman P, Ramsdell B, Lundblade L, Repka L (1998) S/MIME Version 2 Message Specification. RFC 2311

    Google Scholar 

  27. Dusse S, Hoffman P, Ramsdell B, Weinstein J (1998) S/MIME Version 2 Certificate Handling. RFC 2312

    Google Scholar 

  28. Housley R (1999) Cryptographic Message Syntax. RFC 2630

    Google Scholar 

  29. Rescorla E (1999) Diffie-Hellman Key Agreement Method. RFC 2631

    Google Scholar 

  30. Ramsdell B (ed) (1999) S/MIME Version 3 Certificate Handling. RFC 2632

    Google Scholar 

  31. Ramsdell B (ed) (1999) S/MIME Version 3 Message Specification. RFC 2633

    Google Scholar 

  32. Hoffman P (ed) (1999) Enhanced Security Services for S/MIME. RFC 2634

    Google Scholar 

  33. Housley R (2004) Cryptographic Message Syntax. RFC 3852

    Google Scholar 

  34. Housley R (2007) Cryptographic Message Syntax (CMS) Multiple Signer Clarification. RFC 4853

    Google Scholar 

  35. Ramsdell B (ed) (1999) S/MIME Version 3.1 Certificate Handling. RFC 3850

    Google Scholar 

  36. Ramsdell B (ed) (1999) S/MIME Version 3.1 Message Specification. RFC 3851

    Google Scholar 

  37. Kent S (2005) IP Authentication Header. RFC 4302

    Google Scholar 

  38. Kent S (2005) IP Encapsulating Security Payload (ESP). RFC 4303

    Google Scholar 

  39. Harkins D, Carrel D (1998) The Internet Key Exchange (IKE). RFC 2409

    Google Scholar 

  40. Kaufman C (ed) (2005) Internet Key Exchange (IKEv2) Protocol. RFC 4306

    Google Scholar 

  41. Dierks T, Allen C (1999) The TLS Protocol Version 1.0. RFC 2246

    Google Scholar 

  42. Dierks T, Rescorla E (2006) The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346

    Google Scholar 

  43. Rescorla E, NModadugu N (2006) Datagram Transport Layer Security. RFC 4347

    Google Scholar 

  44. Ylonen T, Lonvick C (ed) (2006) The Secure Shell (SSH) Protocol architecture. RFC 4251

    Google Scholar 

  45. Harrington D, Salowey J, Hardaker W (2009) Secure Shell Transport Model for the Simple Network Management Protocol (SNMP). RFC 5592

    Google Scholar 

  46. Rigney C, Willens S, Rubens A, Simpson W (2000) Remote Authentication Dial in User Service (RADIUS). RFC 2865

    Google Scholar 

  47. Rigney C (2000) RADIUS Accounting. RFC 2866

    Google Scholar 

  48. Rigney C, Willats W, Calhoun P (2000) RADIUS Extensions. RFC 2869

    Google Scholar 

  49. Mitton D, St.Johns M, Barkley S, Nelson D, Patil B, Stevens M, Wolff B (2001) Authentication, Authorization, and Accounting: Protocol Evaluation. RFC 3127

    Google Scholar 

  50. Mitton D (2000) Network Access Servers Requirements: Extended RADIUS Practices. RFC 2882

    Google Scholar 

  51. http://www.3gpp2.org/

  52. Callas J, Donnerhacke L, Finney H, Shaw D, Thayer R (2007) OpenPGP Message Format. RFC 4880

    Google Scholar 

  53. http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/

  54. http://www.w3.org/TR/2008/REC-xmldsig-core-20080610/

  55. http://www.oasis-open.org/specs/#samlv2.0

  56. National Institute of Standards and Technology (2001) FIPS Pub 197: Advanced Encryption Standard (AES). 26 November 2001.

    Google Scholar 

  57. http://www.jcp.org/

  58. http://ice-car.darmstadt.gmd.de/ice-car-home.html

  59. Freeman T, Housley R, Malpani A, Cooper D, Polk W (2007) Server-Based Certificate Validation Protocol (SCVP). RFC 5055

    Google Scholar 

  60. http://www.w3.org/TR/2001/NOTE-xkms-20010330/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Housley, R. (2011). Security Standards Activities. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_96

Download citation

Publish with us

Policies and ethics