{"id":114,"date":"2024-11-01T12:58:35","date_gmt":"2024-11-01T03:58:35","guid":{"rendered":"https:\/\/www.icss-rt.org\/en\/?page_id=114"},"modified":"2025-10-28T15:13:23","modified_gmt":"2025-10-28T06:13:23","slug":"icss-jc-swg8","status":"publish","type":"page","link":"https:\/\/www.icss-rt.org\/en\/activity\/icss-jc\/icss-jc-swg8\/","title":{"rendered":"ICSS-JC SWG8"},"content":{"rendered":"\n<div class=\"wp-block-vk-blocks-border-box vk_borderBox vk_borderBox-background-transparent has-text-color has-vk-color-custom-2-color is-style-vk_borderBox-style-solid-round-tit-tab\"><div class=\"vk_borderBox_title_container has-background has-vk-color-custom-2-background-color\"><i class=\"\"><\/i><h4 class=\"vk_borderBox_title\">Conditions for Participation<\/h4><\/div><div class=\"vk_borderBox_body\">\n<ul class=\"wp-block-list\">\n<li>In addition to joining IC System Security Society (ICSS-RT), you must also join the CC Evaluation and Certification Subcommittee (ICSS-JC) and register as a member of the SWG in which you wish to participate.<\/li>\n\n\n\n<li>Upon joining ICSS-JC, you are required to pay the annual membership fee set by ICSS-RT and pledge to the ICSS-JC Information Management Rules. (Please feel free to contact the secretariat for details.)<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Activity Themes - Security of Embedded Devices &amp;  Cutting-edge security technology research<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We are exploring the possibility of research collaboration with national research and development projects related to embedded product security, and are considering initiatives to assure the security of embedded devices.<\/li>\n\n\n\n<li>In addition, EOP\/EOFM attack experiments will be continued while strengthening cooperation with CPSEC of the National Institute of Advanced Industrial Science and Technology.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Activity Themes - Security of Embedded Devices &amp; Cutting-edge security technology research<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":112,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"vkexunit_cta_each_option":"","footnotes":""},"class_list":["post-114","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/comments?post=114"}],"version-history":[{"count":4,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/114\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/114\/revisions\/319"}],"up":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/112"}],"wp:attachment":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/media?parent=114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}