Ingénierie de la sécurité incendie — Protocole de vérification et de validation de modèles d'év...
Le présent document décrit un protocole pour la vérification et la validation des modèles d'évacuation incendie des bâtiments. Le présent document aborde principalement les composants des modèles d'évacuation tels qu'ils sont utilisés dans les modèles microscopiques (basés sur des agents). Il peut néanmoins être adopté (en tout ou en partie) pour des modèles macroscopiques si le…
Information technology — Home electronic system (HES) architecture — Part 3-10: Amplitude modulated ...
1 Scope
This part of ISO/IEC 14543 specifies a wireless protocol for low-powered devices such as
energy harvesting devices in a home environment. This wireless protocol is specifically
designed to keep the energy consumption of such sensors and switches extremely low.
The design is characterized by
• keeping the communications very short, infrequent and mostly unidirectional, and
• using…
Information technology — Home electronic system (HES) architecture — Part 5-102: Intelligent groupin...
1 Scope
This part of ISO/IEC 14543 specifies the system architecture and communication protocols of
remote universal management profile to achieve intelligent grouping, resource sharing and
service collaboration among different devices and controllers. The protocol features are:
a) remote universal device discovery and management framework that includes connection
methods and network…
Information technology — Radio frequency identification (RFID) for item management: Data protocol — ...
1
Scope
This part of ISO/IEC 15961 focuses on the abstract interface between an application and the data processor, and includes the specification and definition of application commands and responses. It allows data and commands to be specified in a standardised way, independent of the particular air interface of ISO/IEC 18000.
This part of ISO/IEC 15961
?
provides guidelines on how data…
Information technology — Conformance test methods for security service crypto suites — Part 10: Cryp...
1 Scope
This document describes test methods for determining the conformance of security crypto suites defined in ISO/IEC 29167-10.
This document contains conformance tests for all mandatory and applicable optional functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and…
Information technology — Multimedia application format (MPEG-A) — Part 19: Common media application ...
1 Scope
This document specifies the CMAF multimedia format, which contains segmented media objects optimized for streaming delivery and decoding on end user devices in adaptive multimedia presentations.
CMAF specifies a track format derived from the ISO base media file format, then derives addressable media objects from CMAF tracks that can be used for storage and delivery.
CMAF specifies sets…
Information technology — Conformance test methods for security service crypto suites — Part 16: Cryp...
This document describes test methods for determining the conformance of security crypto suites defined in ISO/IEC 29167-16.
This document contains conformance tests for all mandatory and applicable optional functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and…
Information technology - Conformance test methods for security service crypto suites - Part 16: Cryp...
This document describes test methods for determining the conformance of security crypto suites defined in ISO/IEC 29167-16.
This document contains conformance tests for all mandatory and applicable optional functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and…
Power systems management and associated information exchange - Data and communications security - Pa...
IEC 62351-6:2020 specifies messages, procedures, and algorithms for securing the operation of all protocols based on or derived from the IEC 61850 series. This document applies to at least those protocols listed below:<br />
IEC 61850-8-1 Communication networks and systems for power utility automation – Part 8-1: Specific communication service mapping (SCSM) – Mappings to MMS (ISO/IEC 9506-…
Power systems management and associated information exchange - Data and communications security - Pa...
IEC 62351-6:2020 specifies messages, procedures, and algorithms for securing the operation of all protocols based on or derived from the IEC 61850 series. This document applies to at least those protocols listed below:
IEC 61850-8-1 Communication networks and systems for power utility automation – Part 8-1: Specific communication service mapping (SCSM) – Mappings to MMS (ISO/IEC 9506-1 and ISO/…