Software, systems and enterprise — Architecture evaluation framework
1 Scope
This document specifies the means to organize and record architecture evaluations for enterprise,
systems and software fields of application.
The aim of this document is to enable architecture evaluations that are used to:
a) validate that architectures address the concerns of stakeholders;
b) assess the quality of architectures with respect to their intended purpose;
c) assess the…
Information technology for learning, education and training — Learning analytics interoperability — ...
1 Scope
This document specifies privacy and data protection requirements and attributes to inform design of learning analytics systems and learning analytics practices in schools, universities, workplace learning and blended learning settings.
Information technology for learning, education and training — AccessForAll framework for individuali...
1 Scope
This document specifies an API in support of ISO/IEC DIS 24751-1. In particular, this document specifies:
— a data format (in JSON) for the exchange of registry entries (AfA concept records) between registry servers;
— a set of RESTful operations for AfA registry servers to allow for the manipulation of AfA concept registry entries by external clients other than server-internal web…
Information technology — Vocabulary — Part 36: Learning, education and training
1 Scope
This document provides terms and definitions for vocabulary used in the field of learning, education and training (LET) to facilitate international communication in the field. This document also identifies and provides the relationships among the vocabulary ensuring a cohesive and harmonized approach.
Information technology — Radio frequency identification for item management — Methods for localizati...
1 Scope
This document defines how to use the RFID air interface standards of the ISO/IEC 18000 series that are based on backscatter technology for localization of RFID tags, specifically tags which are ISO/IEC 18000-4, ISO/IEC 18000-61, ISO/IEC 18000-62, ISO/IEC 18000-63 and ISO/IEC 18000-64 compliant.
This document specifies the physical and logical requirements for localization. The system…
Identification cards — Integrated circuit cards — Part 8: Commands and mechanisms for security opera...
1 Scope
This document specifies interindustry commands which can be used for security operations. This
document also provides informative directives on how to construct security mechanisms with
commands defined in ISO/IEC 7816-4.
The choice and conditions of use of cryptographic mechanism in security operations can affect card
exportability. The evaluation of the suitability of algorithms…
IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption
1 Scope
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining…