Intelligent transport systems — Roadside modules SNMP data interface — Part 7: Support features
Field devices are a key component in intelligent transport systems (ITS). Field devices include traffic signals, message signs, weather stations, traffic sensors, roadside equipment for connected ITS (C-ITS) environments, etc.
Field devices often need to exchange information with other external entities (managers). Field devices can be quite complex, necessitating the standardization of many data…
Intelligent transport systems — Roadside modules SNMP data interface — Part 4: Notifications
Field devices are a key component in intelligent transport systems (ITS). Field devices include traffic signals, message signs, weather stations, traffic sensors, roadside equipment for connected ITS (C-ITS) environments, etc.
Field devices often need to exchange information with other external entities (managers). Field devices can be quite complex, necessitating the standardization of many data…
Information technology — Guidance for the use of database language SQL — Part 9: Online analytic pro...
This document discusses the syntax and semantics for including online analytic processing (OLAP) capabilitiesin SQL, as defined in ISO/IEC 9075-2.It discusses the following features regarding OLAP capabilities of the SQL language:— Feature T611, “Elementary OLAP operations”,— Feature T612, “Advanced OLAP operations”,— Feature T614, “NTILE function”,— Feature T615, “LEAD and LAG functions”,—…
Information technology - Guidance for the use of database language SQL - Part 9: Online analytic pro...
This document discusses the syntax and semantics for including online analytic processing (OLAP) capabilitiesin SQL, as defined in ISO/IEC 9075-2.It discusses the following features regarding OLAP capabilities of the SQL language:— Feature T611, “Elementary OLAP operations”,— Feature T612, “Advanced OLAP operations”,— Feature T614, “NTILE function”,— Feature T615, “LEAD and LAG functions”,—…
Information technology — Conformance test methods for security service crypto suites — Part 11: Cryp...
This document specifies methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-11.
This document contains conformance tests for all mandatory functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and replies;
— nominal values and…
Information technology - Conformance test methods for security service crypto suites - Part 11: Cryp...
This document specifies methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-11.
This document contains conformance tests for all mandatory functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and replies;
— nominal values and…
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
1 Scope
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result…
Systems and software engineering — High-level Petri nets — Part 3: Extensions and structuring mechan...
1 Scope
This document defines enrichments, extensions and structuring mechanisms of Petri nets, applied on the definitions proposed in ISO/IEC 15909-1. This document facilitates the definitions of new kinds of Petri nets and their interoperability, while remaining compatible with those defined in ISO/IEC 15909-1.
This document is written as a reference for designers of new Petri net variants,…
Information technology — Data protocol for radio frequency identification (RFID) for item management...
1 Scope
This document focuses on the abstract interface between an application and the data processor and includes the specification and definition of application commands and responses. It allows data and commands to be specified in a standardised way, independent of the ISO/IEC 18000 series air interfaces.
This document:
— provides guidelines on presenting data as objects;
— defines the…
Information technology — Radio frequency identification (RFID) for item management — Data protocol: ...
1 Scope
This document focuses on encoding the transfer syntax of the application commands defined in ISO/IEC 15961-1. The encodation is in a Logical Memory as a software analogue of the physical memory of the RFID tag being addressed by the interrogator.
This document
— defines the encoded structure of object identifiers;
— specifies the data compaction rules that apply to the encoded data…