Information technology — Telecommunications and information networks — Part 1AE: Media access contr...
The scope of this standard is to specify provision of connectionless user data confidentiality, frame data
integrity, and data origin authenticity by media access independent protocols and entities that operate
transparently to MAC Clients.
NOTE—The MAC Clients are as specified in IEEE Std 802, IEEE Std 802.2™, IEEE Std 802.1D™, IEEE Std 802.1Q™,
and IEEE Std 802.1X™.2
To this end it
a)…
Information technology — Telecommunications and information exchange between systems — Local and met...
1.1 Scope
This standard defines an extensible IEEE 802® media access independent services framework (i.e.,
function and protocol) that enables the optimization of services including handover service when performed
between heterogeneous IEEE 802 networks. It also facilitates these services when networking between
IEEE 802 networks and cellular networks.
Cards and security devices for personal identification — Contactless vicinity objects — Part 3: Anti...
1 Scope
This document specifies:
— protocols and commands;
— other parameters required to initialize communications between a vicinity integrated circuit card and a vicinity coupling device;
— methods to detect and communicate with one card among several cards ("anticollision");
— optional means to ease and speed up the selection of one among several cards based on application…
Information technology — Data protocol for radio frequency identification (RFID) for item management...
1 Scope
This document specifies rules and code structures associated with the data constructs for RFID for item management. In particular, it:
— defines the application family identifier (AFI), including the range of code values that are available to use for RFID for item management;
— defines the data format, including the range of code values that are available to use for RFID for item…
Information technology — Telecommunications and information exchange between systems — Local and met...
1.1 Scope
This standard specifies procedures, managed objects, and protocols for bridges and end systems that provide
identification and replication of packets for redundant transmission, identification of duplicate packets, and
elimination of duplicate packets. It is not concerned with the creation of the multiple paths over which the
duplicates are transmitted.
Radioprotection — Surveillance et dosimétrie en cas d'exposition interne due à la contamination...
Le présent document spécifie les exigences relatives à la surveillance de la contamination individuelle et l'évaluation de la dose à la suite de plaies impliquant des matériaux radioactifs. Il inclut les exigences relatives à la surveillance directe du site de la plaie, la surveillance du transfert des radionucléides dans l'organisme et l'évaluation des doses locales et systémiques…
Radiological protection — Monitoring and dosimetry for internal exposures due to wound contamination...
This document specifies the requirements for personal contamination monitoring and dose assessment following wounds involving radioactive materials. It includes requirements for the direct monitoring at the wound site, monitoring of uptake of radionuclides into the body and assessment of local and systemic doses following the wound event.
It does not address:
— details of monitoring and…
Power systems management and associated information exchange - Data and communications security - Pa...
IEC 62351-3:2014+A1:2018+A2:2020 specifies how to provide confidentiality, integrity protection, and message level authentication for SCADA and telecontrol protocols that make use of TCP/IP as a message transport layer when cyber-security is required. Although there are many possible solutions to secure TCP/IP, the particular scope of this part is to provide security between communicating…
Gestion des systèmes de puissance et échanges d'informations associés - Sécurité des communicat...
L'IEC 62351-3:2014+A1:2018+A2:2020 spécifie comment garantir la confidentialité, la protection de l'intégrité et l'authentification des niveaux des messages pour les protocoles SCADA (système de commande, de surveillance et d'acquisition de données, Supervisory Control And Data Acquisition) et de téléconduite qui utilisent les protocoles TCP/IP comme couche transport des…
Web-service-based application programming interface (WAPI) in financial services
This document defines the framework, function and protocols for an API ecosystem that will enable online synchronised interaction. Specifically, the document:
— defines a logical and technical layered approach for developing APIs, including transformational rules. Specific logical models (such as ISO 20022 models) are not included, but they will be referenced in the context of specific…