Information technology — Multimedia application format (MPEG-A) — Part 16: Publish/Subscribe Applica...
1 Scope
This document specifies four formats that are used by parties communicating using the Publish/Subscribe (PubSub) communication model for their multimedia communication purposes.
The PubSub parties are: Publisher, Subscriber, Match Service Provider (MSP) and Consumer and the formats employed are Resource Information (RI), Publication Information (PI), Subscription Information (SI) and…
Information technology — ASN.1 encoding rules — Part 8: Specification of JavaScript Object Notation ...
Scope
This Recommendation | International Standard specifies a set of JavaScript Object Notation Encoding Rules (JER) that may be used to derive a transfer syntax for values of types defined in Rec. ITU-T X.680 | ISO/IEC 8824-1, Rec. ITU-T X.681 | ISO/IEC 8824-2, Rec. ITU-T X.682 | ISO/IEC 8824-3, Rec. ITU-T X.683 | ISO/IEC 8824-4. It is implicit in the specification of these encoding rules that…
Information technology — Telecommunications and information exchange between systems — Local and met...
1.1 Scope
This standard defines the physical layer (PHY) and medium access control (MAC) sublayer specifications
for low-data-rate wireless connectivity with fixed, portable, and moving devices with no battery or very
limited battery consumption requirements. In addition, the standard provides modes that allow for precision
ranging. PHYs are defined for devices operating various license-free…
Ergonomics of human-system interaction — Part 129: Guidance on software individualization
1
Scope
This part of ISO 9241 provides ergonomics guidance on individualization within interactive systems, including recommendations on
?
where individualization might be appropriate or inappropriate, and
?
how to apply individualization.
It focuses on individualization of the software user interface to support the needs of users as individuals or as members of a defined group.
It does…
Identification cards — Test methods — Part 3: Integrated circuit cards with contacts and related int...
1 Scope
This document defines test methods for characteristics of integrated circuit cards with contacts and related interface devices according to the definition given in ISO/IEC 7816-3. Each test method is cross-referenced to one or more base standards, which can be ISO/IEC 7810 that defines the information storage technologies employed in identification card applications.
NOTE Criteria for…
Information technology — Small Computer System Interface (SCSI) — Part 263: SAS Protocol Layer — 3 (...
1 Scope
This document defines the protocol layer of the Serial Attached SCSI (SAS) interconnect and three transport
protocols that use the SAS interconnect:
a) Serial SCSI Protocol (SSP): a mapping of SCSI supporting multiple initiators and targets;
b) Serial ATA Tunneled Protocol (STP): a mapping of Serial ATA expanded to support multiple initiators
and targets; and
c) Serial Management…
Cards and security devices for personal identification — Contactless vicinity objects — Part 1: Phys...
1 Scope
This document defines the physical characteristics of vicinity cards (VICCs). It is intended to be used in conjunction with other parts of the ISO/IEC 15693 series.
Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
1 Scope
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples. This document establishes a common terminology and approach for specifying metrics.
This document is for the benefit of and use for both cloud service providers (CSPs) and cloud service customers (CSCs). This document is intended to…
Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
1 Scope
This document provides guidance for:
— selecting and specifying security functional requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII);
— the procedure to define both privacy and security functional requirements in a coordinated manner; and
— developing privacy functional requirements as extended components based on the privacy principles…