Information security - Key management - Part 7: Cross-domain password-based authenticated key exchan...
This document specifies mechanisms for cross-domain password-based authenticated key exchange, all of which are four-party password-based authenticated key exchange (4PAKE) protocols. Such protocols let two communicating entities establish a shared session key using just the login passwords that they share with their respective domain authentication servers. The authentication servers, assumed to…
Assistive products for walking manipulated by both arms — Requirements and test methods — Part 2: Ro...
This document specifies requirements and test methods of rollators being used as assistive products for walking with wheels, manipulated by both arms, without accessories, unless specified in the particular test procedure. This document also gives requirements relating to safety, ergonomics, performance and information supplied by the manufacturer including marking and labelling.
The requirements…
Solid recovered fuels — Guidance for the specification of solid recovered fuels (SRF) for selected u...
This document addresses the provision of background references that are helpful in defining a more detailed specification for SRF according to its specific end use for energy conversion (EfW plants) and to support the SRF market. The aim is to enable all the interested stakeholders – producers, end users, legislators, local authority bodies and standardization bodies – to guarantee that the SRF…
Information technology — Open systems interconnection — Part 8: The Directory: Public-key and attrib...
1 Scope
This Recommendation | International Standard addresses some of the security requirements in the areas of authentication and other security services through the provision of a set of frameworks upon which full services can be based. Specifically, this Recommendation | International Standard defines frameworks for:
–public-key certificates; and
–attribute certificates.
The public-key…
Information technology — Open systems interconnection — Part 9: The Directory: Replication
1 Scope
This Recommendation | International Standard specifies a shadow service which Directory system agents (DSAs) may use to replicate Directory information. The service allows Directory information to be replicated among DSAs to improve service to Directory users. The shadowed information is updated, using the defined protocol, thereby improving the service provided to users of the Directory.
Information technology for learning, education and training — Reference framework of e-Portfolio inf...
1 Scope
This document specifies a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and personal development.
The reference framework identifies content and functional…
Systems and software engineering — Software life cycle processes — Part 2: Relation and mapping betw...
1 Scope
This document provides the mapping expressing corresponding relations between software life cycle
processes in ISO/IEC/IEEE 12207:2017 and the processes in ISO/IEC 12207:2008.
These relations are demonstrated by means of mapping tables that show relationships between
activities and tasks, and process outcomes.
This mapping assists users of ISO/IEC 12207:2008 to transition to using…
Systems and software engineering — Life cycle processes — Risk management
1 Scope
1.1 Overview
This document:
— provides risk management elaborations for the processes described in ISO/IEC/IEEE 15288 and
ISO/IEC/IEEE 12207,
— provides the users of ISO/IEC/IEEE 15288, ISO/IEC/IEEE 12207 and their associated elaboration
standards with common terminology and specialized guidance for performing risk management
within the context of systems and software engineering…
Information technology — Open systems interconnection — Part 1: The Directory: Overview of concepts,...
1 Scope
The Directory provides the directory capabilities required by many application layer standards and telecommunication services. Among the capabilities which it provides are those of "user-friendly naming", whereby objects can be referred to by names which are suitable for citing by human users (though not all objects need have user-friendly names); and "name-to-address…
Information technology — Open systems interconnection — Part 2: The Directory: Models
1 Scope
The models defined in this Recommendation | International Standard provide a conceptual and terminological framework for the other ITU-T X.500-series Recommendations | parts of ISO/IEC 9594 which define various aspects of the Directory.
The functional and administrative authority models define ways in which the Directory can be distributed, both functionally and administratively.…