Sökning - 12 resultat för 'TK 611'

Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 5 apr 2023
Se merSe mindre
 

Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 5 apr 2023
Se merSe mindre
 

Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 2 apr 2023
Se merSe mindre
 

This document specifies a structure for globally and unambiguously identifying organizations, and parts thereof, for the purpose of information interchange.
This document also makes recommendations regarding cases where prior agreements may be concluded between interchange partners.
This document does not specify file organization techniques, storage media, languages, etc. to be used in its implementation.
NOTE: The procedure for registration of organization identification schemes is specified in ISO/IEC 6523-2.

Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 22 mar 2023
Se merSe mindre
 

Ämnesområden: Fysiska skikt
Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 15 feb 2023
Se merSe mindre
 

This document specifies requirements to verify NFCIP-2 mode selection and initial communication in the selected modes.

Ämnesområden: Programspråk
Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 8 mar 2023
Se merSe mindre
 

This document specifies software programming language vulnerabilities to be avoided in the development of systems where assured behaviour is required for security, safety, mission-critical and business-critical software. In general, the description of the vulnerabilities and description of avoidance
mechanisms are applicable to the software developed, reviewed, or maintained for any application.
Vulnerabilities are described in a generic manner that is applicable to a broad range of programming languages.

Ämnesområden: Tillämpningsskikt
Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 8 mar 2023
Se merSe mindre
 

This Recommendation | International Standard supplements Rec. ITU-T X.509 | ISO/IEC 9594-8 and Rec. ITU-T X.510 | ISO/IEC 9594-11 by providing extended analysis of cryptographic algorithms and guidance in establishment and maintenance of a public-key infrastructure (PKI).
It is outside the scope of this Recommendation | International Standard to define new cryptographic algorithms, but it is within scope to discuss already-defined cryptographic algorithms that provide
optimal protection, including protection in the future with powerful quantum computers.
This Recommendation | International Standard specifies how public-key infrastructure (PKI) may be adapted to support machine-to-machine (M2M) communication, e.g., Smart grid and Internet of Things (IoT) to allow interworking.
This Recommendation | International Standard specifies the procedures for establishment and maintenance of a PKI supporting new areas, such as intelligent electricity net (smart grid), industrial internet of things.

Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 8 mar 2023
Se merSe mindre
 

Ämnesområden: Tillämpningsskikt
Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 1 mar 2023
Se merSe mindre
 

The scope of this Recommendation | International Standard is threefold.
This Recommendation | International Standard provides guidance on how to prepare new and old protocols for cryptographic algorithm migration, and defines auxiliary cryptographic algorithms to be used for migration purposes.
This Recommendation | International Standard specifies a general wrapper protocol that provides authentication, integrity and confidentiality (encryption) protection for other protocols. This wrapper protocol includes a migration path for cryptographic algorithms allowing for smooth migration to stronger cryptographic algorithms as such requirements evolve. This will allow migration to quantum-safe cryptographic algorithms. Protected protocols can then be developed without taking security and cryptographic algorithms into consideration.
This Recommendation | International Standard also includes some protocols to be protected by the wrapper protocol primarily for support of public-key infrastructure (PKI). Other specifications, e.g., Recommendations or International Standards, may also develop protocols designed to be protected by the wrapper protocol.

Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 15 feb 2023
Se merSe mindre
 

This document defines the Swordfish Scalable Storage Management API.

Swordfish extends the Redfish Scalable Platforms Management API Specification, as defined by ISO 30115. It defines a comprehensive, RESTful API for storage management that addresses block storage, file systems, object storage, and storage network infrastructure. It is centered around common operational and business concerns of storage management, including:

Configuration and provisioning

Monitoring

Event and log management

Performance assessment

Diagnostics

Fault detection and remediation

Security

Accounting and resource consumption

Swordfish’s storage model is built around well-defined classes of service, which provide a means to map high-level business goals and objectives to specific, storage-based actions and requirements, in a clear and consistent way that can be applied uniformly across a broad spectrum of storage configurations and storage types (e.g., block storage, file systems, object stores). Common storage management functionality covered by class of service includes snapshots, replication, mapping and masking, and provisioning.

The Redfish specification provides the protocols and a core set of data models and behaviors for the management of systems. It defines the elements and behaviors that are mandatory for all Redfish implementations. Additionally it defines additional elements and behaviors that can be chosen by system vendors or manufacturers. The specifications also defines points at which OEM (system vendor) extensions can be provided by a given implementation. The specifications specifies normative requirements for Redfish Services and associated materials, such as Redfish Schema files. The Redfish specifications does not set requirements for Redfish clients, but willindicate what a Redfish client should do in order to access and utilize a Redfish Service successfully and effectively.

The Swordfish specification defines additional data models and behaviors for the management of storage systems and storage infrastructure. A Swordfish implementation shall conform to all requirements specified in the Redfish specifications.

Swordfish is suitable for a wide range of storage, from small-scale object drives, integrated RAID cards or RBODs providing storage services, to external disk arrays or file servers, to infrastructure providing storage services for converged, hyperscale and large scale cloud environments.

 

Kommittébeteckning: SIS/TK 611 (Informationsteknik)
Källa: ISO
Svarsdatum: den 8 feb 2023
Se merSe mindre