Skip to main content

Information Security Standardization — the ETSI Perspective

  • Chapter
ISSE 2006 — Securing Electronic Busines Processes

Abstract

The European Telecommunications Standards Institute (ETSI) has been involved in almost every aspect of information security standardization, from algorithms to smart cards, from fixed and mobile teleconmiunication infrastructures to electronic signatures, from lawful interception to broadcasting. As a result, with a unique expertise and a vision of security in ICT as a whole developed, the Institute is now attempting to face the next challenges.

This paper gives a comprehensive overview of the security-related activities that are taking place within the Institute, the major security standards that have been published and views on which are the major issues to be addressed in the future within ETSI, but also in collaboration with other standardization bodies and the Industry.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ETSI TS 133 102 Universal Mobile Telecommunications System (UMTS); 3G security; Security architecture (3GPP TS 33.102)

    Google Scholar 

  2. ETSI TS 143 020 Digital cellular telecommunications system (Phase 2+); Securityrelated network functions (3GPP TS 43.020)

    Google Scholar 

  3. ETSI TS 122 016 Technical Specification Group Services and System Aspects; International Mobile station Equipment Identities (IMEI) (3GPP TS 22.016)

    Google Scholar 

  4. ETSI TS 187 001; TISPAN NGN Security Requirements-NGN Release 1

    Google Scholar 

  5. ETSI TS 187 003; TISPAN NGN Security-Security Architecture-NGN Release 1

    Google Scholar 

  6. ISOIIEC 15408 Information technology Security techniques-Evaluation criteria for IT security

    Google Scholar 

  7. ETSI ES 201 671 Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic

    Google Scholar 

  8. ETSI TS 102 232 Lawful Interception (LI); Handover Specification for IP Delivery

    Google Scholar 

  9. ETSI TS 102 233 Service-specific details for e-mail services

    Google Scholar 

  10. ETSI TS 102 234 Lawful Interception (LI); Service-specific details for internet access services

    Google Scholar 

  11. TR 102 519 Lawful Interception (LI); Lawful Interception of WLAN Internet Access

    Google Scholar 

  12. ETSI TR 133 908 Universal Mobile Teleconmiunications System (UMTS); Security Algorithms Group of Experts (SAGE); General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms (3GPP TR 33.908)

    Google Scholar 

  13. ETSI Future Security Workshop: the threats, risks and opportunities, Output Report 2006 (http://portal.etsi.org/securityworkshop/)

  14. EC DG Justice M1355, “Elaboration of European Standards to identify and reduce crime risk in products and services”

    Google Scholar 

  15. Charles Brookson, “GSM (and PCN) Security and encryption”, 1994

    Google Scholar 

  16. Charles Brookson, Dionisio Zumerle “Security for ICT-the work of ETSI”, ETSI, 2006-http://www.etsi.org/etsi_radar/whitepaper/wp_l.htm

  17. EC COM(2006) 251 A strategy for a Secure Information Society-“Dialogue, partnership and empowerment”

    Google Scholar 

  18. 2006/24/EC Directive of the European Parliament and of the Council on the “retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC”

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Brookson, C., Zumerle, D. (2006). Information Security Standardization — the ETSI Perspective. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9195-2_12

  • Publisher Name: Vieweg

  • Print ISBN: 978-3-8348-0213-2

  • Online ISBN: 978-3-8348-9195-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics