Informationsteknik, kontorsutrustning

Kommittébeteckning: SIS/TK 255 (Vägtrafikinformatik)
Källa: ISO
Svarsdatum: den 21 feb 2019
Se merSe mindre
 

This Technical Specification specifies the TPEG application Traffic Flow and Prediction (TFP). It has been specifically designed to provide information to a variety of receivers using different channels, including in the first instance Digital Broadcasting and Internet technologies. Traffic flow and prediction messages are intended for in-car applications and may be as well presented directly to the user by textual, voiced and graphically output devices.

TFP is status oriented, i.e. the transmitted information updates continuously the receiver's knowledge for a dedicated road network. In particular the traffic states are delivered any time and for all road sections of the network, even when there are no abnormal traffic situations.

Generally, TFP focuses on the following requirements:

— provide dynamic navigation systems with up-to-date traffic state information,

— ensure travel safety for the driver,

— enable the calculation of alternative routes,

— avoid delays (e.g. traffic jams),

— lower traffic load on over-saturated parts of the network,

— keep driver informed about current and upcoming traffic,

— compact and efficient coding of the traffic information.

Kommittébeteckning: SIS/TK 255 (Vägtrafikinformatik)
Källa: ISO
Svarsdatum: den 21 feb 2019
Se merSe mindre
 

TPEG applications are modelled in UML to provide an application description that is independent of a physical format representation. By separating semantics from application description, applications can easily be developed at a functional level. Different physical format representations can be generated following a well defined set of rules on how to convert UML classes to different physical formats.

This Technical Specification specifies the rules for converting UML models of TPEG application to the TPEG binary format. It contains the binary format definition of the abstract data types defined in ISO/TS 21219-2. Rules for converting compound data types are also defined.

Kommittébeteckning: SIS/TK 255 (Vägtrafikinformatik)
Källa: ISO
Svarsdatum: den 21 feb 2019
Se merSe mindre
 

This Technical Specification specifies the rules for converting TPEG application UML models to the tpegML format description. It contains the XML format definition of the abstract data types defined in ISO/TS 21219-2. Rules for converting compound data types are also defined.

Kommittébeteckning: SIS/TK 255 (Vägtrafikinformatik)
Källa: ISO
Svarsdatum: den 21 feb 2019
Se merSe mindre
 

This Technical Specification establishes a method of conveying data for a wide range of applications that require the efficient transmission of point to multi-point data over potentially unreliable broadcast channels. It is also suitable for point-to-point and multicast applications and may easily be encapsulated in Internet Protocol.

This Technical Specification describes the basic capabilities of the generation 2 TPEG (TPEG2) for providing a multiplex of TPEG Services and applications. Together with the definitions of the general TPEG UML modelling rules and the particular physical TPEG representations for TPEG- binary streams (TISA: TPEG UML Conversion Rules) and tpegML files (TISA Specification: TPEG UML Conversion Rules), it replaces the former documents TPEG-INV and TPEG-SSF.

Kommittébeteckning: SIS/TK 255 (Vägtrafikinformatik)
Källa: ISO
Svarsdatum: den 21 feb 2019
Se merSe mindre
 

This Technical Specification adds a basic toolkit definition to the ISO 21219 series specifying the Message Management Container (MMC), which is used by all TPEG applications to provide information about the handling of messages on the TPEG client side. The MMC holds administrative information allowing a decoder to handle the message appropriately. This information is not aimed at the end user. The MMC is a toolkit and not a stand-alone application but is included by TPEG applications.

Kommittébeteckning: SIS/TK 255 (Vägtrafikinformatik)
Källa: ISO
Svarsdatum: den 28 feb 2019
Se merSe mindre
 

This Technical Specification specifies rules for the creation and extending of TPEG application UML models. The rules are intended to ensure that TPEG application UML models can be interpreted unambiguously for conversion to physical format representations. TPEG application UML models that are defined according to these rules may be used for automatic generation of TPEG standards and for automatic generation of TPEG application physical format descriptions.

This Technical Specification also specifies the preferred structure of TPEG application specifications.

The TPEG abstract data types and the set of TPEG tables of common use are specified in the annexes.

Kommittébeteckning: SIS/TK 303 (IT-system och IT-tjänster)
Källa: ISO
Svarsdatum: den 3 mar 2019
Se merSe mindre
 

This document, within the context of methods and tools for supporting the diagnosis of the organization’s capability to adopt or improve in software and systems product line engineering:

— provides the terms and definitions specific to technical probe for software and systems product line;

— defines processes for product line technical probe. Those processes are described in terms of purpose, inputs, tasks and outcomes;

— defines method capabilities to support the defined tasks of each process; and

— defines tool capabilities that automate or semi-automate tasks and methods.

This document does not concern processes and capabilities of tools and methods for a single system but rather deals with those for a family of products.

Kommittébeteckning: SIS/TK 302 (Multimedia, kodning och representation)
Källa: ISO
Svarsdatum: den 5 mar 2019
Se merSe mindre
 

This document includes the specification of information metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces to genomic information:

• Metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 in clause 6.

• Protection elements (providing confidentiality, integrity and privacy rules at the different encapsulation levels as specified in ISO/IEC 23092-1) in clause 8.

• How to associate auxiliary fields to encoded reads in clause 8.

 • Mechanisms for backward compatibility with existing SAM content, and exportation to this format in clause 9.

• Interfaces to access genomic information coded in compliance with ISO/IEC 23092-1 and ISO/IEC 23092-2 in clause 10.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 5 mar 2019
Se merSe mindre
 

This document gives guidelines for:

a) information security professionals considering the purchase of cyber insurance as a risk treatment option to share cyber risks;

b) leveraging cyber insurance to assist manage the impact of a cyber incident;

c) sharing of data and information between the insured and an insurer to support underwriting, monitoring and claims activities associated with a cyber insurance policy;

d) leveraging an information security management system when sharing relevant data and information with an insurer.

This document is applicable to organizations of all types, sizes and nature as the insured and an insurer of cyber insurance.

This document covers organizations that choose to insure with a 3rd party also known as an insurer.

Kommittébeteckning: SIS/TK 445 (Teckenrepresentation och användargränssnitt)
Källa: ISO
Svarsdatum: den 5 mar 2019
Se merSe mindre
 

Within the general scope described in ISO/IEC 9995-1, this part of ISO 9995 defines the allocation on a

keyboard of a set of graphic characters which, when used in combination with an existing national version

keyboard layout, allows the input of a minimum character repertoire as defined herein.

This repertoire is intended to address all characters needed to write all contemporary languages using the Latin

script, together with standardized Latin transliterations of some major languages using other scripts. It also

contains all symbols and punctuation marks contained in ISO 8859-1, together with some selected other ones

commonly used in typography and office use.

It also addresses characters of some other scripts (Greek, Cyrillic, Armenian, Georgian, Hebrew) to the same

extent (in the case of Cyrillic, leaving out some minority languages of the Russian Federation which have only a

few hundred speakers left). It provides means to include other scripts (e.g. Arabic, Devanagari) in future

versions of this part of ISO 9995 (e.g. by amendments).

Furthermore, it addresses the International Phonetic Alphabet (IPA).

This part of ISO 9995 is primarily intended for word-processing and text-processing applications, to be used with

full-sized keyboards as well as with miniature keyboards found on mobile devices ("smartphones" or handheld

computers), especially ones which have only keys for the 26 basic Latin letters but no dedicated keys for digits.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 11 mar 2019
Se merSe mindre
 

This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.

In particular, this document specifies PIMS-related requirements and provides guidance for PII controllers and PII processors holding responsibility and accountability for PII processing. 

This document is applicable to all types and sizes of organizations, including public and private companies, government entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII within an ISMS.

Excluding any of the requirements specified in Clause 5 of this document is not acceptable when an organization claims conformity to this document.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 17 mar 2019
Se merSe mindre
 

ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It specifies cryptographic techniques specifically designed to establish one or more secret keys based on a weak secret derived from a memorized password, while preventing offline brute-force attacks associated with the weak secret. ISO/IEC 11770-4:2017 is not applicable to the following aspects of key management:
-      life-cycle management of weak secrets, strong secrets, and established secret keys;
-      mechanisms to store, archive, delete, destroy, etc. weak secrets, strong secrets, and established secret keys.

Kommittébeteckning: SIS/TK 323 (Geodata)
Källa: CEN
Svarsdatum: den 24 mar 2019
Se merSe mindre
 

This document specifies the data structure and content of an interface that permits communication between position-providing device(s) and position-using device(s) enabling the position-using device(s) to obtain and unambiguously interpret position information and determine, based on a measure of the degree of reliability, whether the resulting position information meets the requirements of the intended use.

A standardized interface for positioning will allow the integration of reliable position information obtained from non-specific positioning technologies and will be useful in various location-focused information applications, such as surveying, navigation, intelligent transportation systems (ITS), and location-based services (LBS).

Kommittébeteckning: SIS/TK 269 (Information för byggande och förvaltning)
Källa: CEN
Svarsdatum: den 28 mar 2019
Se merSe mindre
 

This European standard establishes the rules for defining properties used in construction and a methodology for authoring and maintaining them, for a confident and seamless digital share between stakeholders.

Regarding definition of properties and groups of properties, the standard provides:

— definitions of properties and groups of properties as a list of attributes

— definition of each attributes

Regarding authoring and maintaining process, the standard provides:

— definition and role of applicants,

— definition and role of experts and college of experts,

— definition of request’s attributes,

— definition of expert’s attributes,

— a governance model through the establishment of a steering committee;

— management rules to interconnect dictionaries through properties and groups of properties mapping process.

Kommittébeteckning: SIS/TK 448 (Teknik och stödsystem för personlig identifiering)
Källa: ISO
Svarsdatum: den 31 mar 2019
Se merSe mindre
 

This International standard is one of a series of standards describing the characteristics for identification cards as defined in the definitions clause and the use of such cards for international interchange.

This International standard specifies the physical characteristics of identification cards including card materials, construction, characteristics, and dimensions for four sizes of cards.

ISO/IEC 10373-1 and ISO/IEC 24789-2 specify the test procedures used to check cards against the parameters specified in this International Standard.

This International Standard specifies the requirements for card interface devices used for identification. It takes into consideration both human and machine aspects and states minimum requirements.

It is the purpose of this series of standards to provide criteria to which cards shall perform. No consideration is given within these standards to the amount of use, if any, experienced by the card prior to test. Failure to conform to specified criteria should be negotiated between the involved parties.

NOTE 1 Numeric values in the SI and/or Imperial measurement system in this International Standard may have been rounded off and therefore are consistent with, but not exactly equal to, each other. Either system may be used, but the two should not be intermixed or reconverted. The original design was made using the Imperial measurement system.

NOTE 2 Thin flexible cards are not within the scope of this international standard (see ISO/IEC 15457).

Kommittébeteckning: SIS/TK 303 (IT-system och IT-tjänster)
Källa: ISO
Svarsdatum: den 11 apr 2019
Se merSe mindre
 

This document provides guidance on governance of IT enabled investments to the governing body of all forms of organizations, whether private, public or government entities, and will equally apply regardless of size of the organization or its industry or sector. The terms business and business outcome throughout this document include all forms of organization covered by this document.

The document also provides guidance to other parties interacting with governing bodies such as project personnel, accountants, management consultants and investment portfolio managers.

 IT enabled investments within the scope of this document could be investments of any scale from acquiring businesses to any business change incorporating IT, building new business services or addressing effectiveness and efficiency gains in IT operational services to gain competitive edge, whether those services are internal or provided by external parties.

This document also provides guidance that can be applied in the due diligence process related to business acquisitions. This document may provide guidance on the application of the principles documented in ISO/IEC 38500 for ranking IT enabled investments including assessing the value and risks of IT elements in the context of investment banking or as performed by investment companies.

This document does not prescribe or define specific management practices required for IT enabled investments. For guidance on the implementation arrangement for the effective governance of IT in general refer to        ISO/IEC TS 38501. The constructs in ISO/IEC TS 38501 can help to identify internal and external factors relating to the governance of IT and to define beneficial outcomes and identify evidence of success. For guidance on the integration between the governing body and management of an organization in general refer to ISO/IEC TR 38502.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 611 (Systemintegration för unika enheters identifiering och dess attribut)
Källa: ISO
Svarsdatum: den 15 apr 2019
Se merSe mindre
 

suites defined in ISO/IEC 29167-10.

This part of ISO/IEC 19823 contains conformance tests for all mandatory and applicable optional functions.

The conformance parameters are the following:

— parameters that apply directly affecting system functionality and inter-operability

— protocol including commands and replies

— nominal values and tolerances

Unless otherwise specified, the tests in this part of ISO/IEC 19823 are to be applied exclusively related to RFID tags and interrogators defined in the ISO/IEC 18000- series using ISO/IEC 29167-10.

Kommittébeteckning: SIS/TK 611 (Systemintegration för unika enheters identifiering och dess attribut)
Källa: ISO
Svarsdatum: den 15 apr 2019
Se merSe mindre
 

This International Standard defines the requirements for the symbology known as Extended Rectangular Data Matrix (DMRE). It specifies the DMRE Code symbology characteristics, data character encodation, symbol formats, dimensions and print quality requirements, error correction rules, decoding algorithm, and userselectable application parameters.

It applies to all DMRE Code symbols produced by any printing or marking technology.

Original Data Matrix code sizes are not covered by this standard but defined with ISO/IEC 16022 using same matrix placement, decoding and error correction algorithm.

Kommittébeteckning: SIS/TK 448 (Teknik och stödsystem för personlig identifiering)
Källa: ISO
Svarsdatum: den 20 apr 2019
Se merSe mindre
 

This International Standard defines test methods for characteristics of identification cards according to

the definition given in ISO/IEC 7810. Each test method is cross-referenced to one or more base

standards, which may be ISO/IEC 7810 or one or more of the supplementary standards that define the

information storage technologies employed in identification cards applications.

NOTE 1 Criteria for acceptability do not form part of this International Standard but will be found

in the International Standards mentioned above.

NOTE 2 Test methods described in this International Standard are intended to be performed

separately. A given card is not required to pass through all the tests sequentially.

This part of ISO/IEC 10373 defines test methods which are common to one or more card technologies.

Other parts of the standard define technology-specific test methods.

Ämnesområden: IT-säkerhet
Kommittébeteckning: SIS/TK 318 (Informationssäkerhet)
Källa: ISO
Svarsdatum: den 24 apr 2019
Se merSe mindre
 

This document specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms.

Firstly, this document specifies methods for testing whether a given number is prime. The testing methods included in this document are divided into two groups:

- Probabilistic primality tests, which have a small error probability. All probabilistic tests described here can declare a composite to be a prime.

- Deterministic methods, which are guaranteed to give the right verdict. These methods use so-called primality certificates.

Secondly, this document specifies methods to generate prime numbers. Again, both probabilistic and deterministic methods are presented.

NOTE Readers with a background in algorithm theory may have had previous encounters with probabilistic and deterministic algorithms. The deterministic methods in this document internally still make use of random bits (to be generated via methods described in ISO/IEC 18031), and “deterministic” only refers to the fact that the output is correct with probability one.

Annex A provides error probabilities that are utilized by the Miller-Rabin primality test.

Annex B describes variants of the methods for generating primes so that particular cryptographic requirements can be met.

Annex C defines primitives utilized by the prime generation and verification methods.