Systems and software engineering — High-level Petri nets — Part 3: Extensions and structuring mechan...
This document defines enrichments, extensions and structuring mechanisms of Petri nets, applied on the definitions proposed in ISO/IEC 15909-1. This document facilitates the definitions of new kinds of Petri nets and their interoperability, while remaining compatible with those defined in ISO/IEC 15909-1.
This document is written as a reference for designers of new Petri net variants, by defining…
Systems and software engineering - High-level Petri nets - Part 3: Extensions and structuring mechan...
This document defines enrichments, extensions and structuring mechanisms of Petri nets, applied on the definitions proposed in ISO/IEC 15909-1. This document facilitates the definitions of new kinds of Petri nets and their interoperability, while remaining compatible with those defined in ISO/IEC 15909-1.
This document is written as a reference for designers of new Petri net variants, by defining…
Road vehicles — In-vehicle Ethernet — Part 10: Transport layer and network layer conformance test pl...
This document specifies in-vehicle Ethernet transport layer and network layer conformance test plans (CTP) for electronic control units (ECUs). This document is a collection of all conformance test cases which are recommended to be considered for automotive use and should be referred by car manufacturers within their quality control processes.
The document includes conformance test plans for the…
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data…
Information security - Key management - Part 3: Mechanisms using asymmetric techniques
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data…
Information technology - Open Connectivity Foundation (OCF) Specification - Part 1: Core specificati...
The OCF Core specifications are divided into a set of documents:
Core specification (this document): The Core specification document specifies the Framework, i.e., the OCF core architecture, interfaces, protocols and services to enable OCF profiles implementation for Internet of Things (IoT) usages and ecosystems. This document is mandatory for all Devices to implement.
Core optional…
Information technology - Open Connectivity Foundation (OCF) Specification - Part 5: OCF device speci...
The Device definitions use Resource definitions from ISO/IEC 30118-4.
This document is built on top of ISO/IEC 30118-1. ISO/IEC 30118-1 specifies the core architecture, interfaces protocols and services to enable the implementation of profiles for IoT usages and ecosystems. ISO/IEC 30118-1 also defines the main architectural components of network connectivity, discovery, data transmission, device…
Information technology – Open Connectivity Foundation (OCF) Specification - Part 9: Core optional sp...
The OCF Core specifications are divided into a series of documents:
Core specification: The Core specification document specifies the Framework, i.e., the OCF core architecture, interfaces, protocols and services to enable OCF profiles implementation for Internet of Things (IoT) usages and ecosystems. This document is mandatory for all Devices to implement.
Core optional specification (this…