Information technology — Storage management — Part 6: Fabric
1 Scope
The Storage Management Technical Specification, Part 6 Fabric defines management profiles for
Autonomous (top level) profiles for programs and devices whose central function is providing support for
storage networking. This version of Storage Management Technical Specification, Part 6 Fabric includes
these autonomous profiles:
• Fabric
This profile defines the model and functions of…
Information technology — Storage management — Part 7: Host elements
1 Scope
The host-base storage portion of the Storage Management Technical Specification defines management
profiles for autonomous, component and abstract profiles for management of host-based storage devices.
The autonomous profiles describe the management of a stand-alone host-based storage entity. The
component profiles describe management of aspects of host-based storage entities that may…
Information technology — Storage management — Part 8: Media libraries
1 Scope
This version of the specification models various details of the following objects of the media library for
monitoring.
• Library
• Drives
• Changer Devices
• Slots
• IO Slots
• SCSI Interfaces and SCSI and FC Target Ports
• Physical Tapes
• Physical Package
• Magazines
In general, a CIM client can monitor the health and status of the above objects as well as get alert, status…
Information technology — Generic applications of ASN.1 — Part 4: Cryptographic message syntax
1 Scope
This Recommendation | International Standard enhances the existing cryptographic message syntax (CMS) protocol by adding signcryption techniques and providing a new Abstract Syntax Notation One (ASN.1) module which conforms to the latest edition of the ASN.1 standard which can be used with all standardized encoding rules of ASN.1.
Software and systems engineering — Methods and tools for the feature-based approach to software and ...
1 Scope
This document is a specialization of the more general reference model for software and systems product line engineering and management described in ISO/IEC 26550. The specialization defined herein addresses a class of methods and tools referred to as feature-based software and systems product line engineering, or feature-based PLE, which has emerged as a proven and repeatable product…
Information technology — Electronic discovery — Part 4: Technical readiness
1 Scope
This document provides guidance on the ways an organization can plan and prepare for, and implement, electronic discovery from the perspective of both technology and processes. This document provides guidance on proactive measures that can help enable effective and appropriate electronic discovery and processes.
This document is relevant to both non-technical and technical personnel…
Systems and software engineering — Lifecycle profiles for Very Small Entities (VSEs) — Part 4-2: Sof...
1 Scope
This document provides a profile specification for the organizational management profile. The organizational management profile applies to VSEs involved in systems engineering and/or software engineering development.
This document provides links to the subset of ISO/IEC/IEEE 12207 and ISO 9001 organizational, resources, processes and project portfolio process elements from the…
Information technology — Smart City ICT reference framework — Part 2: Smart city knowledge managemen...
1 Scope
This document specifies a generic knowledge management framework for a smart city, focusing on creating, capturing, sharing, using and managing smart city knowledge. It also gives the key practices which are required to be implemented to safeguard the use of knowledge, such as interoperability of heterogeneous data and governance of multi-sources services within a smart city.
Information technology — Extensible biometric data interchange formats — Part 6: Iris image data
1 Scope
This document specifies:
— generic extensible data interchange formats for the representation of iris image data: a tagged binary data format based on an extensible specification in ASN.1 and a textual data format based on an XML schema definition that are both capable of holding the same information,
— examples of data record contents,
— application specific requirements,…
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms usi...
1 Scope
This part of ISO/IEC 20008 specifies anonymous digital signature mechanisms, in which a verifier
makes use of a group public key to verify a digital signature.
It provides
— a general description of an anonymous digital signature mechanism using a group public key, and
— a variety of mechanisms that provide such anonymous digital signatures.
For each mechanism, this part of ISO/IEC…