Information technology — Upper level ontology for smart city indicators
1 Scope
This document establishes general principles and gives guidelines for an indicator upper level ontology (IULO) for smart cities that enables the representation of indicator definitions and the data used to derive them. It includes:
— concepts (e.g., indicator, population, cardinality); and
— properties that relate concepts (e.g., cardinality_of, parameter_of_var).
Information technology — Cloud computing — Taxonomy based data handling for cloud services
1 Scope
This document:
— describes a framework for the structured expression of data-related policies and practices in the cloud computing environment, based on the data taxonomy in ISO/IEC 19944;
— provides guidelines on application of the taxonomy for handling of data based on data subcategory and classification;
— covers expression of data-related policies and practices including, but not…
Information technology — Multimedia application format (MPEG-A) — Part 19: Common media application ...
1 Scope
This document specifies the CMAF multimedia format, which contains segmented media objects optimized for streaming delivery and decoding on end user devices in adaptive multimedia presentations.
CMAF specifies a track format derived from the ISO base media file format, then derives addressable media objects from CMAF tracks that can be used for storage and delivery.
CMAF specifies sets…
Information technology — MPEG systems technologies — Part 10: Carriage of timed metadata metrics of ...
1 Scope
This document defines a storage format for timed metadata. The timed metadata can be associated with other tracks in the ISO base media file format. Timed metadata such as quality and power consumption information and their metrics are defined in this part for carriage in files based on the ISO base media file format (ISO/IEC 14496-12). The timed metadata can be used for multiple…
Information security, cybersecurity and privacy protection — Guidelines for information security man...
1 Scope
This document provides guidance on managing an information security management system (ISMS) audit programme, on conducting audits, and on the competence of ISMS auditors, in addition to the guidance contained in ISO 19011.
This document is applicable to those needing to understand or conduct internal or external audits of an ISMS or to manage an ISMS audit programme
Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC ...
1 Scope
This document specifies the requirements for creating sector-specific standards that extend ISO/IEC 27001, and complement or amend ISO/IEC 27002 to support a specific sector (domain, application area or market).
This document explains how to:
— include requirements in addition to those in ISO/IEC 27001,
— refine or interpret any of the ISO/IEC 27001 requirements,
— include controls…
Information technology — Electronic discovery — Part 3: Code of practice for electronic discovery
1 Scope
This document provides requirements and recommendations on activities in electronic discovery, including, but not limited to, identification, preservation, collection, processing, review, analysis and production of electronically stored information (ESI). In addition, this document specifies relevant measures that span the lifecycle of the ESI from its initial creation through to final…
Information technology — Generic cabling for customer premises — Part 9906: Balanced 1-pair cabling ...
1 Scope
This document covers channel specifications, for channels constructed from balanced 1-pair
cabling components, primarily intended for use in industrial automation and process control
applications.
The channel specifications are consistent with corresponding IEEE 802.3 single-pair Ethernet
(SPE) applications and are referenced from link segment specifications in the following IEEE…
Information technology — Cloud computing — Edge computing landscape
1 Scope
This document examines the concept of edge computing, its relationship to cloud computing and IoT, and the technologies that are key to the implementation of edge computing. This document explores the following topics with respect to edge computing:
— concept of edge computing systems;
— architectural foundation of edge computing;
— edge computing terminology;
— software…
Information technology — Security techniques — Guidance for the production of protection profiles an...
1 Scope
This document provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408 (all parts). It is also applicable to PPs and STs compliant with Common Criteria Version 3.1 Revision 4[6], a technically identical standard published by the Common Criteria Management Board, a…