Affiner les résultats
Affichage de 1897 - 1908 de 2300
Avis d'intention
Technologies de l'information — Architecture ...
This document specifies the PhoneManagement profile of the ConfigurationManagement Service defined in [7]. The PhoneManagement profile can be used for managing the configuration of the UPnP TelephonyServer device (i.e. a...
Avis d'intention
Technologies de l'information — Architecture ...
This service definition is compliant with the [1]. It defines a service type referred to herein as Presence service. The Presence service is a UPnP service that allows control points, or better known as Telephony Control...
Avis d'intention
Technologies de l’information — Architecture ...
This document defines the device for IOT Management and Control, which identifies Level 1 of the device named IOT Management and Control. This Publicly Available Specification is applicable to Standardized DCPs of the UPnP...
Avis d'intention
Ingénierie des systèmes et du logiciel — Gestion...
This document provides a common framework for planning and controlling the technical processes and activities to produce and sustain software products. The complete life cycle is covered by this document, from idea conception...
Avis d'intention
Technologies de l'information - Télécommunications...
*******Also Includes Amd 1, Amd 2, Amd 3, Amd 4, Amd 5, and Amd 7****** This standard defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a...
Avis d'intention
Technologies de l'information — Techniques de...
This part of ISO/IEC 18033 specifies several asymmetric ciphers. These specifications prescribe the functional interfaces and correct methods of use of such ciphers in general, as well as the precise functionality and cipher...
Avis d'intention
Technologies de l'information — Méthodes d'essai...
1 Scope This document defines test methods for determining the conformance of radio frequency identification (RFID) devices (tags and interrogators) for item management with the specifications given in ISO/IEC 18000-61, ISO...
Avis d'intention
Sécurité de l'information - Chiffrement authentifié...
This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of...
Avis d'intention
Sécurité de l'information - Critères et méthodologie...
For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies: extended security functional...
Avis d'intention
Technologies de l'information - Gestion des incidents...
This document gives guidelines for information security incident response in ICT security operations. This document does this by firstly covering the operational aspects in ICT security operations from a people, processes and...
Avis d'intention
Sécurité de l'information - Gestion de clés - ...
This document specifies mechanisms to establish shared symmetric keys between groups of entities. It defines: — symmetric key-based key establishment mechanisms for multiple entities with a key distribution centre (KDC); and...
Avis d'intention
Technologies de l'information pour l'apprentissage...
This document specifies a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers...