Affiner les résultats
Affichage de 1861 - 1872 de 9713
Avis d'intention
Technologies de l'information — Techniques de...
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Avis d'intention
Technologies de l'information - Interface de ...
This part of ISO/IEC 14776 defines the command set extensions to facilitate operation of SCSI direct access block devices. The clauses in this standard, implemented in conjunction with the applicable clauses of SPC-4, specify...
Avis d'intention
Technologies de l'information — Architecture ...
Today multi-screen/second-screen solutions are proliferating. However, each is a proprietary vertical for particular vendor(s). Therefore users expectations aren’t being met: Seamless interoperability across vendors. Ability...
Avis d'intention
Technologies de l'information - Recommandations...
This document discusses the syntax and semantics for recognizing patterns in rows of a table, as defined in ISO/IEC 9075-2, commonly called “SQL/RPR”. SQL/RPR defines two features regarding row pattern recognition: Feature...
Avis d'intention
Technologies de l'information - Recommandations...
This document describes the support in SQL for JavaScript Object Notation. This document discusses the following features of the SQL language: Storing JSON data. Publishing JSON data. Querying JSON data. SQL/JSON data model...
Avis d'intention
Technologies de l'information - Recommandations...
This document describes the definition and use of polymorphic table functions in SQL. The Report discusses the following features of the SQL Language: The processing model of polymorphic table functions in the context of SQL...
Avis d'intention
Technologies de l'information - Indicateurs...
This document specifies the energy reuse factor (ERF) as a KPI to quantify the reuse of the energy consumed in a data centre. ERF is defined as the ratio of energy being reused divided by the sum of all energy consumed in a...
Avis d'intention
Sécurité de l'information - Techniques cryptographiques...
La série ISO/IEC 15946 spécifie les techniques cryptographiques à clé publique basées sur des courbes elliptiques décrites dans l'ISO/IEC 15946-1. Ce document définit les techniques de génération de courbes elliptiques utiles...
Technologies de l'information - Techniques de sécurité - Gestion de clés - Partie 3: Mécanismes utilisant des techniques asymétriques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Avis d'intention
Technologies de l'information - Interface de ...
This part of ISO/IEC 14776 defines the mechanical, electrical, timing, and protocol requirements of the SCSI parallel interface to allow conforming SCSI devices to inter-operate. The SCSI parallel interface is a local I/O bus...
Avis d'intention
Technologies de l'information - Techniques de...
Scope This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Avis d'intention
Technologies de l'information - Cadre multimédia...
This part of ISO/IEC 21000 specifies the syntax and semantics of a Rights Expression Language. This part of ISO/IEC 21000 does not give any permission, including permissions about who is legally or technically allowed to...