Nothing Special   »   [go: up one dir, main page]

skip to main content
RFC2828: Internet Security Glossary2000 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 May 2000
Reflects downloads up to 16 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with Internet security, particularly Internet Standards documents (ISDs). To avoid confusion, ISDs should use the same term or definition whenever the same concept is mentioned. To improve international understanding, ISDs should use terms in their plainest, dictionary sense. ISDs should use terms established in standards documents and other well-founded publications and should avoid substituting private or newly made-up terms. ISDs should avoid terms that are proprietary or otherwise favor a particular vendor, or that create a bias toward a particular security technology or mechanism versus other, competing techniques that already exist or might be developed in the future.

RFC Downloads

Cited By

  1. ACM
    Zimmer E, Burkert C and Federrath H (2021). Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders, Digital Threats: Research and Practice, 3:1, (1-35), Online publication date: 31-Mar-2022.
  2. ACM
    Birkholz H and Fossati T Trustworthy things Proceedings of the 2021 Workshop on Descriptive Approaches to IoT Security, Network, and Application Configuration, (26-29)
  3. ACM
    Alani M Prioritizing Cloud Security Controls Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication Technologies, (1-6)
  4. ACM
    Schefer-Wenzl S and Feiertag K A Domain-Specific Language for XML Security Standards Proceedings of the 2014 European Conference on Software Architecture Workshops, (1-7)
  5. Moallemi M, Seker R, Towhidnejad M, Standley J, Klein R and Jackson P Threat modeling for aircraft access to national airspace system wide information management program Proceedings of the 17th Communications & Networking Simulation Symposium, (1-8)
  6. Omar M, Challal Y and Bouabdallah A (2012). Review, Journal of Network and Computer Applications, 35:1, (268-286), Online publication date: 1-Jan-2012.
  7. ACM
    Fitzgerald W and Foley S Management of heterogeneous security access control configuration using an ontology engineering approach Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, (27-36)
  8. ACM
    Fenz S and Ekelhart A Formalizing information security knowledge Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (183-194)
  9. ACM
    Benini M and Sicari S Towards more secure systems Proceedings of the 4th international conference on Security and privacy in communication netowrks, (1-6)
  10. ACM
    Arnab A and Hutchison A Persistent access control Proceedings of the 2007 ACM workshop on Digital Rights Management, (41-53)
  11. Djordjevic I, Dimitrakos T, Romano N, Mac Randal D and Ritrovato P (2007). Dynamic security perimeters for inter-enterprise service integration, Future Generation Computer Systems, 23:4, (633-657), Online publication date: 1-May-2007.
  12. Hwang T, Lee K and Li C (2007). Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols, IEEE Transactions on Dependable and Secure Computing, 4:1, (71-80), Online publication date: 1-Jan-2007.
  13. Berbecaru D and Lioy A On the robustness of applications based on the SSL and TLS security protocols Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice, (248-264)
  14. ACM
    Arnab A and Hutchison A Verifiable digital object identity system Proceedings of the ACM workshop on Digital rights management, (19-26)
  15. ACM
    Vecchio D, Hazlewood V and Humphrey M Evaluating grid portal security Proceedings of the 2006 ACM/IEEE conference on Supercomputing, (114-es)
  16. Demchenko Y, Gommans L, de Laat C and Oudenaarde B Web Services and Grid Security Vulnerabilities and Threats Analysis and Model Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, (262-267)
  17. Oppliger R and Rytz R (2005). Does Trusted Computing Remedy Computer Security Problems?, IEEE Security and Privacy, 3:2, (16-19), Online publication date: 1-Mar-2005.
  18. Hasan and Stiller B A generic model and architecture for automated auditing Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management, (121-132)
  19. Röhrig S and Knorr K (2004). Security Analysis of Electronic Business Processes, Electronic Commerce Research, 4:1-2, (59-81), Online publication date: 1-Jan-2004.
  20. ACM
    Romney G and Stevenson B An isolated, multi-platform network sandbox for teaching IT security system engineers Proceedings of the 5th conference on Information technology education, (19-23)
  21. Moloney S and Ginzboorg P Security for interactions in pervasive networks Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks, (95-106)
  22. ACM
    Mateti P A laboratory-based course on internet security Proceedings of the 34th SIGCSE technical symposium on Computer science education, (252-256)
  23. ACM
    Mateti P (2003). A laboratory-based course on internet security, ACM SIGCSE Bulletin, 35:1, (252-256), Online publication date: 11-Jan-2003.
  24. Kawada E (2002). Authentication Services in Mobile Networks, Wireless Personal Communications: An International Journal, 22:2, (237-243), Online publication date: 1-Aug-2002.
Contributors
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations