Information technology — Fibre Channel — Part 432: Security Protocols – 2 (FC-SP-2)
This document is one of the Fibre Channel family of standards. This standard describes the protocols used to implement security in a Fibre Channel fabric. This standard includes the definition of protocols to authenticate Fibre Channel entities, protocols to set up session keys, protocols to negotiate the parameters required to ensure frame-by-frame integrity and confidentiality, and protocols to…
Information technology - Fibre channel - Part 432: Security protocols - 2 (FC-SP-2)
ISO/IEC 14165-432:2022 is one of the Fibre Channel family of standards. This standard describes the protocols used to implement security in a Fibre Channel fabric. This standard includes the definition of protocols to authenticate Fibre Channel entities, protocols to set up session keys, protocols to negotiate the parameters required to ensure frame-by-frame integrity and confidentiality, and…
Information Technology — Data centres — Application Platform Energy Effectiveness (APEE)
1 Scope
This document specifies application platform energy effectiveness (APEE) as a Key Performance Indicator (KPI) which quantifies the energy effectiveness of an application platform for an IT service in data centres. This KPI evaluates the energy consumption of an application platform prior to deployment. The purpose of this KPI is to measure the energy effectiveness of a set of target IT…
Information technology — Data centres key performance indicators — Part 6: Energy Reuse Factor (ERF)
1 Scope
This document specifies the energy reuse factor (ERF) as a KPI to quantify the reuse of the energy consumed in a data centre. ERF is defined as the ratio of energy being reused divided by the sum of all energy consumed in a data centre. The ERF does reflect the efficiency of the reuse process; the reuse process is not part of a data centre.
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated ha...
1 Scope
This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner.
NOTE A general framework for the provision of integrity services is specified in ISO/IEC 10181-6.
Indicators for rural community well- being, services, and quality of life
1 Scope
1.1 Overview
This Standard provides definitions and methodologies for a set of indicators to identify and measure community well-being, prosperity, and sustainability in rural and small-town contexts, as well as requirements and recommendations for data access and utilization. It is intended to promote the consistent use of common definitions and the measurement of seven key indicators…
Information security — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve ge...
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 29192‑4, ISO/IEC 9796‑3, ISO/IEC 11770‑3, ISO/IEC 14888‑3, ISO/IEC 18033‑2 and ISO/IEC 18033‑5.
This document is applicable to…
Health informatics — Clinical information models — Characteristics, structures and requirements
This document:
— Specifies clinical information models (CIMs) as health and care concepts that can be used to define and to structure information for various purposes in health care, also enabling information reuse;
— Describes requirements for CIMs content, structure and context and specification of their data elements, data element relationships, meta-data and versioning, and provides…
Information security - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve ge...
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 29192‑4, ISO/IEC 9796‑3, ISO/IEC 11770‑3, ISO/IEC 14888‑3, ISO/IEC 18033‑2 and ISO/IEC 18033‑5.
This document is applicable to…
Information security, cybersecurity and privacy protection — Biometric information protection
This document covers the protection of biometric information under various requirements for confidentiality, integrity and renewability/revocability during storage and transfer. It also provides requirements and recommendations for the secure and privacy-compliant management and processing of biometric information.
This document specifies the following:
— analysis of the threats to and…