Skip to main content

Information technology security standards — An Australian perspective

  • Conference paper
  • First Online:
Advances in Cryptology — AUSCRYPT '92 (AUSCRYPT 1992)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 718))

Abstract

From a telecommunications perspective, standards facilitate the implementation of distributed applications. Such systems can be implemented using components produced by different suppliers, at different times, and in ways that involve a minimum of proprietary intellectual property. As such open systems become widely implemented, it is becoming increasingly important to have standards for security services and mechanisms to allow the interests of all interconnected parties to be protected. This paper discusses the role of standards in providing a link between the large body of available theory, and business needs. A standardised approach has the following advantages:

  • agreement can be reached on the meaning of security terminology;

  • security mechanisms can be subject to international, expert scrutiny before adoption;

  • common security mechanisms can be developed in such a way that re-use is possible; and

  • the limited amount of available technical expertise can be efficiently used and made accessible to all parts of industry and government.

When an analysis is made of security standardisation activities around the world, it is quickly appreciated that we are in fact well away from realising an optimum approach to security standards development. However, there is still much to be gained from the standardisation process. This paper looks at the range of security standardisation activities, and then focuses on the work being done to develop generic (basic) security building block standards in the International Organisation for Standardisation (ISO)/International Electrotechnical Commission (IEC), Joint Technical Committee 1, Subcommittee 27. The range of Subcommittee 27 activities is summarised, and an update is given of progress to date. This status is then placed in the perspective of related Australian standardisation activity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Yuliang Zheng

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Snare, J. (1993). Information technology security standards — An Australian perspective. In: Seberry, J., Zheng, Y. (eds) Advances in Cryptology — AUSCRYPT '92. AUSCRYPT 1992. Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57220-1_76

Download citation

  • DOI: https://doi.org/10.1007/3-540-57220-1_76

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57220-6

  • Online ISBN: 978-3-540-47976-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics