Intelligent transport systems — Roadside modules SNMP data interface — Part 7: Support features
Field devices are a key component in intelligent transport systems (ITS). Field devices include traffic signals, message signs, weather stations, traffic sensors, roadside equipment for connected ITS (C-ITS) environments, etc.
Field devices often need to exchange information with other external entities (managers). Field devices can be quite complex, necessitating the standardization of many data…
Intelligent transport systems — Roadside modules SNMP data interface — Part 5: Logs
Field devices are a key component in intelligent transport systems (ITS). Field devices include traffic signals, message signs, weather stations, traffic sensors, roadside equipment for connected ITS (C-ITS) environments, etc.
Field devices often need to exchange information with other external entities (managers). Field devices can be quite complex, necessitating the standardization of many data…
Intelligent transport systems — Roadside modules SNMP data interface — Part 4: Notifications
Field devices are a key component in intelligent transport systems (ITS). Field devices include traffic signals, message signs, weather stations, traffic sensors, roadside equipment for connected ITS (C-ITS) environments, etc.
Field devices often need to exchange information with other external entities (managers). Field devices can be quite complex, necessitating the standardization of many data…
Information technology — Guidance for the use of database language SQL — Part 9: Online analytic pro...
This document discusses the syntax and semantics for including online analytic processing (OLAP) capabilitiesin SQL, as defined in ISO/IEC 9075-2.It discusses the following features regarding OLAP capabilities of the SQL language:— Feature T611, “Elementary OLAP operations”,— Feature T612, “Advanced OLAP operations”,— Feature T614, “NTILE function”,— Feature T615, “LEAD and LAG functions”,—…
Information technology - JPEG XL Image Coding System - Part 3: Conformance testing
This document specifies the conformance testing of the ISO/IEC 18181 series, also known as JPEG XL. Other desirable aspects of implementation (including robustness and performance) are outside the scope of this document.
Information technology - Guidance for the use of database language SQL - Part 9: Online analytic pro...
This document discusses the syntax and semantics for including online analytic processing (OLAP) capabilitiesin SQL, as defined in ISO/IEC 9075-2.It discusses the following features regarding OLAP capabilities of the SQL language:— Feature T611, “Elementary OLAP operations”,— Feature T612, “Advanced OLAP operations”,— Feature T614, “NTILE function”,— Feature T615, “LEAD and LAG functions”,—…
Information technology — JPEG XL Image Coding System — Part 3: Conformance testing
This document specifies the conformance testing of the ISO/IEC 18181 series, also known as JPEG XL. Other desirable aspects of implementation (including robustness and performance) are outside the scope of this document.
Information technology — Conformance test methods for security service crypto suites — Part 11: Cryp...
This document specifies methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-11.
This document contains conformance tests for all mandatory functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and replies;
— nominal values and…
Information technology - Conformance test methods for security service crypto suites - Part 11: Cryp...
This document specifies methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-11.
This document contains conformance tests for all mandatory functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and replies;
— nominal values and…
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
1 Scope
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result…