This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with Internet security, particularly Internet Standards documents (ISDs). To avoid confusion, ISDs should use the same term or definition whenever the same concept is mentioned. To improve international understanding, ISDs should use terms in their plainest, dictionary sense. ISDs should use terms established in standards documents and other well-founded publications and should avoid substituting private or newly made-up terms. ISDs should avoid terms that are proprietary or otherwise favor a particular vendor, or that create a bias toward a particular security technology or mechanism versus other, competing techniques that already exist or might be developed in the future.
RFC Downloads
Cited By
- Zimmer E, Burkert C and Federrath H (2021). Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders, Digital Threats: Research and Practice, 3:1, (1-35), Online publication date: 31-Mar-2022.
- Birkholz H and Fossati T Trustworthy things Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration, (26-29)
- Alani M Prioritizing Cloud Security Controls Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication Technologies, (1-6)
- Schefer-Wenzl S and Feiertag K A Domain-Specific Language for XML Security Standards Proceedings of the 2014 European Conference on Software Architecture Workshops, (1-7)
- Moallemi M, Seker R, Towhidnejad M, Standley J, Klein R and Jackson P Threat modeling for aircraft access to national airspace system wide information management program Proceedings of the 17th Communications & Networking Simulation Symposium, (1-8)
- Omar M, Challal Y and Bouabdallah A (2012). Review, Journal of Network and Computer Applications, 35:1, (268-286), Online publication date: 1-Jan-2012.
- Fitzgerald W and Foley S Management of heterogeneous security access control configuration using an ontology engineering approach Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, (27-36)
- Fenz S and Ekelhart A Formalizing information security knowledge Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (183-194)
- Benini M and Sicari S Towards more secure systems Proceedings of the 4th international conference on Security and privacy in communication netowrks, (1-6)
- Arnab A and Hutchison A Persistent access control Proceedings of the 2007 ACM workshop on Digital Rights Management, (41-53)
- Djordjevic I, Dimitrakos T, Romano N, Mac Randal D and Ritrovato P (2007). Dynamic security perimeters for inter-enterprise service integration, Future Generation Computer Systems, 23:4, (633-657), Online publication date: 1-May-2007.
- Hwang T, Lee K and Li C (2007). Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols, IEEE Transactions on Dependable and Secure Computing, 4:1, (71-80), Online publication date: 1-Jan-2007.
- Berbecaru D and Lioy A On the robustness of applications based on the SSL and TLS security protocols Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice, (248-264)
- Arnab A and Hutchison A Verifiable digital object identity system Proceedings of the ACM workshop on Digital rights management, (19-26)
- Vecchio D, Hazlewood V and Humphrey M Evaluating grid portal security Proceedings of the 2006 ACM/IEEE conference on Supercomputing, (114-es)
- Demchenko Y, Gommans L, de Laat C and Oudenaarde B Web Services and Grid Security Vulnerabilities and Threats Analysis and Model Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, (262-267)
- Oppliger R and Rytz R (2005). Does Trusted Computing Remedy Computer Security Problems?, IEEE Security and Privacy, 3:2, (16-19), Online publication date: 1-Mar-2005.
- Hasan and Stiller B A generic model and architecture for automated auditing Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management, (121-132)
- Röhrig S and Knorr K (2004). Security Analysis of Electronic Business Processes, Electronic Commerce Research, 4:1-2, (59-81), Online publication date: 1-Jan-2004.
- Romney G and Stevenson B An isolated, multi-platform network sandbox for teaching IT security system engineers Proceedings of the 5th conference on Information technology education, (19-23)
- Moloney S and Ginzboorg P Security for interactions in pervasive networks Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks, (95-106)
- Mateti P A laboratory-based course on internet security Proceedings of the 34th SIGCSE technical symposium on Computer science education, (252-256)
- Mateti P (2003). A laboratory-based course on internet security, ACM SIGCSE Bulletin, 35:1, (252-256), Online publication date: 11-Jan-2003.
- Kawada E (2002). Authentication Services in Mobile Networks, Wireless Personal Communications: An International Journal, 22:2, (237-243), Online publication date: 1-Aug-2002.
Recommendations
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the IoT ...
Internet of things security: challenges and perspectives
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud ComputingNo one can deny that the Internet of Things (IOT) will revolutionize our daily thanks to its many benefits in order to improve and simplify people's lives. Us any new technology the internet of things has a number of problems that prevents it to reach ...