Systems and software engineering — Measurement process
1 Scope
This document establishes a common process and framework for measurement of systems and software. It
defines a process and associated terminology from an engineering viewpoint. The process can be applied to the
project and products across the life cycle. The measurement process can be applied throughout the life cycle to aid
the planning, managing, assessing, and decision-making in…
Information technology — Radio frequency identification device conformance test methods — Part 6: Te...
1 Scope
This document defines test methods for determining the conformance of radio frequency identification (RFID) devices (tags and interrogators) for item management with the specifications given in ISO/IEC 18000-61, ISO/IEC 18000-62, ISO/IEC 18000-63 and ISO/IEC 18000-64, but does not apply to the testing of conformity with regulatory or similar requirements.
The test methods require only…
Information technology — IT asset management — Part 1: IT asset management systems — Requirements
1 Scope
1.1 Purpose
This document specifies requirements for an IT asset management system within the context of the organization.
This document can be applied to all types of IT assets and by all types and sizes of organizations.
NOTE 1 This document is intended to be used for managing IT assets in particular, but it can also be applied to other asset types. It can be suitable, in whole or…
Information technology — EPC Information Services (EPCIS) Standard
This document is a GS1 standard that defines Version 1.2 of EPC Information Services (EPCIS). The
goal of EPCIS is to enable disparate applications to create and share visibility event data, both
within and across enterprises. Ultimately, this sharing is aimed at enabling users to gain a shared
view of physical or digital objects within a relevant business context.
Information technology — Security techniques — Telebiometric authentication framework using biometri...
Scope
To prove ownership of an ITU-T X.509 certificate registered individually with the registration authority (RA), a biometric hardware security module has been considered to provide a high-level biometric authentication. This Recommendation | International Standard provides a framework for telebiometric authentication using BHSM.
Within the scope of this Recommendation | International…
Information technology — Scalable compression and coding of continuous-tone still images — Part 4: C...
1 Scope
This document specifies the framework, concepts, methodology for testing, and criteria to be achieved to claim conformance to one or multiple parts of ISO/IEC 18477 as listed below. It provides a framework for specifying abstract test suites and for defining the procedures to be followed during conformance testing.
This document
— specifies conformance testing procedures for decoding…
Information technology — Telecommunications and information exchange between systems — Ubiquitous gr...
1.1 Scope
Based on the protocol defined in IEEE Std 1888™1, IEEE Standard for Ubiquitous Green Community
Control Network Protocol, this standard extends component and data type definitions, message formats,
and communication procedures for heterogeneous network convergence and scalability. This standard also
describes heterogeneous networks interconnection issues and requirements. Also, this…
Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core co...
1 Scope
This document specifies the core conformance requirements for service level agreements (SLAs) for cloud services based on ISO/IEC 19086-1 and guidance on the core conformance requirements. This document is for the benefit of and use by both cloud service providers and cloud service customers.
This document does not provide a standard structure that would be used for cloud SLAs.