JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Analysis of Standard Security Technology for Security of the Network
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
  • Journal title : Journal of Digital Convergence
  • Volume 13, Issue 12,  2015, pp.193-202
  • Publisher : The Society of Digital Policy and Management
  • DOI : 10.14400/JDC.2015.13.12.193
 Title & Authors
Analysis of Standard Security Technology for Security of the Network
Kim, Bong-Han;
  PDF(new window)
 Abstract
The development of the security solutions that can provide a variety of security services is needed urgently. For development of the security solutions, analysis of international standard security technology is the key. In this paper, international organizations' standardization(ISO/IEC JTC1 SC27, ITU-T SG-17, IETF Security Area, etc.) and the current trend of the standard security technology are mainly analyzed. The core of the latest security technology(Application Bridging, DNS-based Authentication, HTTP Authentication, IP Security, Javascript Security, Authentication Technology Next Generation, Managed Incident, Web Authorization Protocol, Security Automation, Transport Layer Security, etc.) is analyzed focusing on 18 working groups of the IETF.
 Keywords
Security;Standard Technology;Standard;ISO/IEC JCT1 SC27;ITU-T;IETF;RFC;
 Language
Korean
 Cited by
 References
1.
Heung-Ryong Oh, Jeong Sik Park, Byoung-Moon Chin, Heung-Youl Youm, "Security International Standardization Status and Driven Systems Analysis", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.21 No.2, pp. 7-18, 2011

2.
Yong-Nyuo Shin, HakIl Kim, Myung-Geun Chun, "Personal Information Protection Reference Architecture and International Standardization Trend", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.21 No.5, pp. 12-20, 2011

3.
Kyeong Hee Oh, Jungduk Kim, Heung-Youl Youm, "A Trend on Security International Standardization", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.23 No.3, pp. 5-13, 2013

4.
Heung-Youl Youm, "An Analysis on Personal Information Protection International Standards", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.25 No.4, pp. 6-10, 2015

5.
Younghun Jeong, Jeonghwan Song, "A Trend on lightweight cryptography International Standardization in ISO/IEC JTC 1/SC 27 WG2", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.25 No.4, pp. 11-17, 2015

6.
Hyun-Sun Kang, "An Analysis of Information Security Management System and Certification Standard for Information Security", Journal of Security Engineering, JSE, Vol.11 No.6, pp. 455-468, 2014 crossref(new window)

7.
HeungYoul Youm, Heung-Ryong Oh, "A Trend on Security Technology and International Standardization(ITU-T SG17)", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.24 No.4, pp. 7-14, 2014

8.
Heung-Ryong Oh, Young-Hwa Kim, Heung-Youl Youm, "A Trend on ITU-T SG17(Security) International Standardization", OSIA Standards & Technology Review, Vol.27 No.2, pp. 8-20, 2014

9.
Jungduk Kim, "A Trend on Security Management International Standardization", Review of KIISC, Korea Institute of Infomation Security and Cryptology, Vol.21 No.2, pp. 19-22, 2011

10.
Heung Ryong Oh, Sungpil Yu, Youngwha Kim, "A trend on information security standardization in ITU-T SG17", Proceedings of the Winter Conference, KICS, Vol.2015 No.1, 2015

11.
ISO/IEC JTC1 SC27, http://www.iso.org/iso/iso_technical_committee?commid=45306

12.
ITU-T, http://www.itu.int/en/ITU-T/studygroups/2013-2016/17/Pages/default.aspx

13.
IETF, http://www.ietf.org/

14.
IETF Security Area, http://datatracker.ietf.org/wg/#sec

15.
abfab, http://datatracker.ietf.org/wg/abfab/documents.

16.
dane, http://datatracker.ietf.org/wg/dane/documents

17.
httpauth, http://datatracker.ietf.org/wg/httpauth/documents

18.
ipsecme, http://datatracker.ietf.org/wg/ipsecme/documents

19.
jose, http://datatracker.ietf.org/wg/jose/documents

20.
kitten, http://datatracker.ietf.org/wg/kitten/documents

21.
mile, http://datatracker.ietf.org/wg/mile/documents

22.
oauth, http://datatracker.ietf.org/wg/oauth/documents

23.
sacm, http://datatracker.ietf.org/wg/sacm/documents

24.
tls, http://datatracker.ietf.org/wg/tls/documents/