CARVIEW |
Select Language
HTTP/2 200
date: Mon, 14 Jul 2025 17:40:52 GMT
content-type: text/html; charset=utf-8
content-security-policy: default-src 'self' 'unsafe-inline' data: https://datatracker.ietf.org/ https://www.ietf.org/ https://ietf.org/ https://analytics.ietf.org https://static.ietf.org; frame-ancestors 'self' ietf.org *.ietf.org meetecho.com *.meetecho.com
cross-origin-opener-policy: unsafe-none
referrer-policy: strict-origin-when-cross-origin
strict-transport-security: max-age=3600; includeSubDomains
vary: Cookie, Accept-Encoding
x-content-type-options: nosniff
x-frame-options: SAMEORIGIN
cf-cache-status: REVALIDATED
expires: Mon, 14 Jul 2025 21:40:51 GMT
cache-control: public, max-age=14400
server: cloudflare
cf-ray: 95f2ceb9ce51a9c3-BLR
content-encoding: gzip
alt-svc: h3=":443"; ma=86400
Security Area (sec)
Skip to main content
Security Area (sec)
Area | Name | Security Area | |
---|---|---|---|
Acronym | sec | ||
State | Active | ||
Additional resources |
Issue tracker,
Security Area Web Page Wiki |
||
Group statistics |
SEC statistics
Loading...
Loading...
|
||
Personnel | Area Directors | Deb Cooley, Paul Wouters |
Group description
The Security Area is the home for working groups focused on security protocols. They provide one or more of the security services: integrity, authentication, non-repudiation, confidentiality, and access control. Since many of the security mechanisms needed to provide these security services employ cryptography, key management is also vital.
The Security Area intersects with all other IETF Areas, and the participants are frequently involved with activities in the working groups from other areas. This involvement focuses upon practical application of Security Area protocols and technologies to the protocols of other Areas.
Groups in SEC
Group | Name | Type |
---|---|---|
Security Area Open Meeting | AG | |
Security Area Directorate | Directorate (with reviews) | |
Authentication and Authorization for Constrained Environments | WG | |
Automated Certificate Management Environment | WG | |
CBOR Object Signing and Encryption | WG | |
DANE Authentication for Network Clients Everywhere | WG | |
Detecting Unwanted Location Trackers | WG | |
EAP Method Update | WG | |
HPKE Publication, Kept Efficient | WG | |
IP Security Maintenance and Extensions | WG | |
Javascript Object Signing and Encryption | WG | |
Key Transparency | WG | |
Common Authentication Technology Next Generation | WG | |
Lightweight Authenticated Key Exchange | WG | |
Limited Additional Mechanisms for PKIX and SMIME | WG | |
Messaging Layer Security | WG | |
Web Authorization Protocol | WG | |
Oblivious HTTP Application Intermediation | WG | |
Open Specification for Pretty Good Privacy | WG | |
Privacy Preserving Measurement | WG | |
Post-Quantum Use In Protocols | WG | |
Privacy Pass | WG | |
RADIUS EXTensions | WG | |
Remote ATtestation ProcedureS | WG | |
System for Cross-domain Identity Management | WG | |
Supply Chain Integrity, Transparency, and Trust | WG | |
Security Dispatch | WG | |
Secure Patterns for Internet CrEdentials | WG | |
Secure Shell Maintenance | WG | |
Software Updates for Internet of Things | WG | |
Trusted Execution Environment Provisioning | WG | |
Transport Layer Security | WG | |
Using TLS in Applications | WG |