Location: Home > IEC
IEC
-
ISO IEC 16680:2012 pdfダウンロード。Information technology — The Open Group Service Integration Maturity Model (OSIMM) 2.2 Maturity Levels At the heart of OSIMM are the seven levels of enterprise business and IT service-integration maturity. Each of the seven levels reflects a possible abstract state of an organization in terms of its maturity in the integration of its services (business and/or IT) and SOA solution. Each maturity level builds on the foundation of its predecessors and will have a cumulative set of maturity attributes. 2.2.1 Level 1: Silo Individual parts of the organization are developing their own software independently, with no integration...08-29 ISO IEC 16680
-
ISO IEC 17007:2009 pdfダウンロード。Conformity assessment — Guidance for drafting normative documents suitable for use for conformity assessment 1 Scope This International Standard provides principles and guidance for developing normative documents thatcontain: specified requirements for objects of conformity assessment to fulfil; specified requirements for conformity assessment systems that can be employed when demonstratingwhether an object of conformity assessment fulfils specified requirements. This international Standard is intended for use by standards developers not applying the ISO/IEC Directivesindustry associations and consortia, purchasers, regulators, consumers and non-government groups.accreditation bodies,conformity assessment bodies, conformity assessment scheme owners, and otherinterested parties, such as insurance organizations. Normative references...08-29 ISO IEC 17007
-
ISO IEC 17417:2011 pdfダウンロード。Information technology — Telecommunications and information exchange between systems — Short Distance Visible Light Communication (SDVLC) Scope This lnternational Standard specifies a phsical layer (PHY) and medium access control (MAC) forcommunication of up to 10 cm distance with an fm of 120 MHz using visual light with the wavelength between380 nm and 780 nm. in addition it specifies human-detectable brightness control that is independent of the modulation for the datatransfer. 2 Conformance Conformant implementations: have both a Transmitter and a Receiver: use 8B10B encoding and may use 2B4B encoding; use an fm of 120 MHz as specified...08-29 ISO IEC 17417
-
ISO IEC 17982:2012 pdfダウンロード。Information technology — Telecommunications and information exchange between systems — Close Capacitive Coupling Communication Physical Layer (CCCC PHY) 1 Scope This International Standard specifies the CCCC PHY for Full duplex and Broadcast communication in time slots on frequency division multiplex channels. 2 Conformance Conforming entities implement: both Talker and Listener, listen before talk (LBT) for both Talker and Listener, the capability to execute association on FDC2 and to communicate on (FDC0 and FDC1), (FDC3 and FDC4), or (FDC0, FDC1, FDC3 and FDC4), the capability for Talkers and Listeners to use any of the 8 TDS on a...08-29 ISO IEC 17982
-
ISO IEC 19772:2009 pdfダウンロード。Information technology — Security techniques — Authenticated encryption 1 Scope This nternational Standard specifies six methods for authenticated encryption, i.. detined ways ot processinga data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data. data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified. data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the dataoriginator. All six methods specified in this lnternational Standard are based on a block cipher algorithm, and require theoriginator and the recipient...08-29 ISO IEC 19772
-
ISO IEC 19792:2009 pdfダウンロード。Information technology — Security techniques — Security evaluation of biometrics 1 Scope This International Standard specifies the subjects to be addressed during a security evaluation of a biometric system. It covers the biometric-specific aspects and principles to be considered during the security evaluation of a biometric system. It does not address the non-biometric aspects which might form part of the overall security evaluation of a system using biometric technology (e.g. requirements on databases or communication channels). This International Standard does not aim to define any concrete methodology for the security evaluation of biometric systems but instead focuses...08-29 ISO IEC 19792
-
ISO IEC 22535:2009 pdfダウンロード。Information technology — Telecommunications and information exchange between systems — Corporate telecommunication networks — Tunnelling of QSIG over SIP 1 Scope This International Standard specifies tunnelling of “QSIG” over the Session Initiation Protocol (SIP) within a corporate telecommunication network (CN). The tunnelling of QSIG through a public IP network employing SIP is outside the scope of this International Standard. However, the functionality specified in this International Standard is in principle applicable to such a scenario when deployed in conjunction with other relevant functionality (e.g. address translation, security functions, etc.). This International Standard is applicable to any interworking...08-29 ISO IEC 22535
-
ISO IEC 24724:2011 pdfダウンロード。Information technology — Automatic identification and data capture techniques — GS1 DataBar bar code symbology specification 1 Scope This International Standard defines the requirements for the GS1 DataBar symbology family. It specifies the characteristics of the GS1 DataBar symbology family, data character encodation, symbol formats, dimensions,print quality requirements, error detection, and decoding algorithms. For GS1 Composite symbols, ISO/IEC 24723 defines the two-dimensional component. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including...08-29 ISO IEC 24724
-
ISO IEC 24745:2011 pdfダウンロード。Information technology — Security techniques — Biometric information protection Scope This lnternational Standard provides guidance for the protection of biometric information under variousrequirements for confidentiality, integrity and renewability/revocability during storage and transfer. Additionally,this International Standard provides requirements and guidelines for the secure and privacy-compliantmanagement and processing of biometric information. This Intemational Standard specifies the following: analysis of the threats to and countermeasures inherent in a biometric and biometric system applicationmodels; security requirements for securely binding between a biometric reference and an identity reference; biometric system application models with different scenarios for the storage and comparison of biometricreferences;and...08-29 ISO IEC 24745
-
ISO IEC 24747:2009 pdfダウンロード。Information technology — Programming languages, their environments and system software interfaces — Extensions to the C Library to support mathematical special functions 1 Scope [scop] 1.1 Relation to C Standard Library Introduction [descr] 1 This International Standard defines extensions to the C standard library that is defined in the International Standard for the C programming language, see Clause 2. 2 Unless otherwise specified, the whole ofthe C Standard Library is included into this International Standard by reference,see Clause 2. 1.2 Categories ofextensions [exten] 1 This International Standard defines library extensions to the C Standard Library to support...08-29 ISO IEC 24747
ランダム文章
みんな大好きな