Erik Andersen
Description of Activities
The number of devices in these areas vastly outnumbers the number of human beings and this area is almost unprotected, which could have detrimental effects on our society. It is the hope that the project could be one way to enable a broader cybersecurity protection.
Fellow's country
Open Call Topics
Impact on SMEs (4th Open Call)
The involved standards are useful so that Europe is involved in this type of cybersecurity, which may affect future EU directives.
Impact on society (4th Open Call)
Every aspect of cybersecurity has a high priority. Access control needs to be timely in place to prevent unauthorised access.
Impact on society (6th Open Call)
This updated standard will allow users (relying parties) to access certificate information for the whole of Europe and be a significant contributor to the single market. The two priorities selected are cybersecurity and interoperability.
The whole scope of DPKI and the proposed access secure protocols are primarily related to cybersecurity. The proposed access protocol will use robust and trusted cryptographic algorithms to protect the protocols. It is prepared for migration to quantum resistant cryptographic algorithms (crypto agility).
In parallel, any communication protocol is designed for interoperability and the two proposed protocols are no exception. Interoperability is a necessity.
The whole scope of DPKI and the proposed access secure protocols are primarily related to cybersecurity. The proposed access protocol will use robust and trusted cryptographic algorithms to protect the protocols. It is prepared for migration to quantum resistant cryptographic algorithms (crypto agility).
In parallel, any communication protocol is designed for interoperability and the two proposed protocols are no exception. Interoperability is a necessity.
Linkedin Profile
Organisation type
Organization
Independent Expert, Andersen's L-Service
Portrait Picture

Proposal Title (1st Open Call)
Second edition of Rec. ITU-T X.510 | ISO/IEC 9594-11
Proposal Title (2nd Open Call)
Key Management and Public-key infrastructure: Establishment and maintenance
Proposal Title (4th Open Call)
Role-based access control for electric power systems
IEC 62351-90-4, Migration of cryptographic algorithms
Proposal Title (6th Open Call)
Revision of ITU-T X.510 | ISO/IEC 9594-11
Role in SDO
StandICT.eu Year
2026
Topic (1st Open Call)
Topic (2nd Open Call)
Topic (4th Open Call)
Topic (6th Open Call)