Information technology — Open systems interconnection — Part 9: The Directory: Replication
This document specifies a shadow service which Directory system agents (DSAs) may use to replicate Directory information. The service allows Directory information to be replicated among DSAs to improve service to Directory users. The shadowed information is updated, using the defined protocol, thereby improving the service provided to users of the Directory.
Information technology — Open systems interconnection — Part 5: The Directory: Protocol specificatio...
This document specifies the Directory Access Protocol, the Directory System Protocol, the Directory Information Shadowing Protocol, and the Directory Operational Binding Management Protocol which fulfil the abstract services specified in Rec. ITU-T X.511 | ISO/IEC 9594-3, Rec. ITU-T X.518 | ISO/IEC 9594-4, Rec. ITU‑T X.525 | ISO/IEC 9594-9, and Rec. ITU-T X.501 | ISO/IEC 9594-2.
Information technology - Open systems interconnection - Part 5: The Directory: Protocol specificatio...
This document specifies the Directory Access Protocol, the Directory System Protocol, the Directory Information Shadowing Protocol, and the Directory Operational Binding Management Protocol which fulfil the abstract services specified in Rec. ITU-T X.511 | ISO/IEC 9594-3, Rec. ITU-T X.518 | ISO/IEC 9594-4, Rec. ITU‑T X.525 | ISO/IEC 9594-9, and Rec. ITU-T X.501 | ISO/IEC 9594-2.
Information technology - Open systems interconnection - Part 9: The Directory: Replication
This document specifies a shadow service which Directory system agents (DSAs) may use to replicate Directory information. The service allows Directory information to be replicated among DSAs to improve service to Directory users. The shadowed information is updated, using the defined protocol, thereby improving the service provided to users of the Directory.
This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
— data confidentiality, i.e. protection against unauthorized disclosure of data;
— data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified;
— data origin authentication, i.e.…
This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
— data confidentiality, i.e. protection against unauthorized disclosure of data;
— data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified;
— data origin authentication, i.e.…
Industrial automation systems and integration — Product data representation and exchange — Part 238:...
This document specifies an application interpreted model (AIM) based on the application reference model for machining defined by ISO 14649-10, ISO 14649-11, ISO 14649-12, ISO 14649-111 and ISO 14649-121, augmented with ISO 10303 product geometry, geometric dimensioning and tolerancing and product data management information.
Fire safety engineering — Verification and validation protocol for building fire evacuation models
This document describes a protocol for the verification and validation of building fire evacuation models. This document mostly addresses evacuation model components as they are in microscopic (agent-based) models. Nevertheless, it can be adopted (entirely or partially) for macroscopic models if the model is able to represent the components under consideration.
The area of application of the…
Ingénierie de la sécurité incendie — Protocole de vérification et de validation de modèles d'év...
Le présent document décrit un protocole pour la vérification et la validation des modèles d'évacuation incendie des bâtiments. Le présent document aborde principalement les composants des modèles d'évacuation tels qu'ils sont utilisés dans les modèles microscopiques (basés sur des agents). Il peut néanmoins être adopté (en tout ou en partie) pour des modèles macroscopiques si le…
Information technology — Home electronic system (HES) architecture — Part 3-10: Amplitude modulated ...
1 Scope
This part of ISO/IEC 14543 specifies a wireless protocol for low-powered devices such as
energy harvesting devices in a home environment. This wireless protocol is specifically
designed to keep the energy consumption of such sensors and switches extremely low.
The design is characterized by
• keeping the communications very short, infrequent and mostly unidirectional, and
• using…