{"id":129,"date":"2024-11-01T13:12:48","date_gmt":"2024-11-01T04:12:48","guid":{"rendered":"https:\/\/www.icss-rt.org\/en\/?page_id=129"},"modified":"2024-11-07T18:11:34","modified_gmt":"2024-11-07T09:11:34","slug":"harware-security-databasesupervision","status":"publish","type":"page","link":"https:\/\/www.icss-rt.org\/en\/achievements\/harware-security-databasesupervision\/","title":{"rendered":"Harware-Security DataBase(Supervision)"},"content":{"rendered":"\n<p>CC Evaluation and Certification Subcommittee (ICSS-JC) of IC System Security - Round Table (ICSS-RT) is cooperating in building, updating and maintaining the Hardware Security Database (HW Security DB), which contains data on major domestic and international papers on hardware security.<\/p>\n\n\n\n<p>HW Security DB is published by the Cyber Physical Security Center (CPSEC) of the National Institute of Advanced Industrial Science and Technology (AIST) on the following page.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u25a0 <strong>Link (opens in new window)<\/strong><br><a href=\"https:\/\/www.cpsec.aist.go.jp\/achievements\/HWS-DB\/index_en.html\" target=\"_blank\" rel=\"noopener\" title=\"\">Hardware Security Database (HW Security DB)<\/a><br><a href=\"https:\/\/www.cpsec.aist.go.jp\/achievements\/HWS-DB\/index_en.html\" target=\"_blank\" rel=\"noopener\" title=\"https:\/\/www.cpsec.aist.go.jp\/achievements\/HWS-DB\/index.html\">https:\/\/www.cpsec.aist.go.jp\/achievements\/HWS-DB\/index.html<\/a><\/p>\n\n\n\n<p>Cyber Physical Security Center (CPSEC), National Institute of Advanced Industrial Science and Technology (AIST)<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>CC Evaluation and Certification Subcommittee (ICSS-JC) of IC System Security - Round Table (ICSS-RT) is cooperating in building, updating and maintaining the Hardware Security Database (HW Security DB), which contains data on major domestic and international papers on hardware security. HW Security DB is published by the Cyber Physical Security Center (CPSEC) of the National [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":45,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"vkexunit_cta_each_option":"","footnotes":""},"class_list":["post-129","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/comments?post=129"}],"version-history":[{"count":4,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/129\/revisions"}],"predecessor-version":[{"id":239,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/129\/revisions\/239"}],"up":[{"embeddable":true,"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/pages\/45"}],"wp:attachment":[{"href":"https:\/\/www.icss-rt.org\/en\/wp-json\/wp\/v2\/media?parent=129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}