Esileht»Infoteenus

35 INFOTEHNOLOOGIA

Tagasi peagrupi juurde

Uued standardid


EVS-EN 62657-2:2017/A1:2019
Hind 10,19 EUR
Identne IEC 62657-2:2017/A1:2019; EN 62657-2:2017/A1:2019
Industrial communication networks - Wireless communication networks - Part 2: Coexistence management
Amendment for EN 62657-2:2017

ISO/IEC 20085-1:2019
Hind 78,30 EUR
IT Security techniques -- Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules -- Part 1: Test tools and techniques
This document provides specifications for non-invasive attack test tools and provides information about how to operate such tools. The purpose of the test tools is the collection of signals (i.e. side-channel leakage) and their analysis as a non-invasive attack on a cryptographic module implementation under test (IUT).

ISO/IEC 19774-1:2019
Hind 140,58 EUR
Information technology -- Computer graphics, image processing and environmental data representation -- Part 1: Humanoid animation (H-Anim) architecture
This document specifies a systematic system for representing humanoids in a network-enabled 3D graphics and multimedia environment. Conceptually, each humanoid is an articulated character that can be embedded in different representation systems and animated using the facilities provided by the representation system. This document specifies the abstract form and structure of humanoids. Further, this document specifies the semantics of humanoid animation as an abstract functional behaviour of time-based, interactive 3D, multimedia articulated characters. This document does not define physical shapes for such characters but does specify how such characters can be structured for animation. This document is intended for a wide variety of presentation systems and applications, providing wide latitude in interpretation and implementation of the functionality.
Asendab ISO/IEC 19774:2006

ISO/IEC 19774-2:2019
Hind 122,79 EUR
Information technology -- Computer graphics, image processing and environmental data representation -- Part 2: Humanoid animation (H-Anim) motion data animation
This document specifies the method of motion capture animation using H-Anim humanoid models. Each humanoid model consists of an articulated character with specified joints and motion capture data. As specified in ISO/IEC 19774-1, each character consists of joints and segments in a hierarchical structure. This document includes the following: - Concepts of motion capture as related to humanoid animation, - Concepts of motion capture data definition, - Definition of motion parameters and motion-capture animation data for transferring or exchanging motion between different humanoid character models, - Mapping the structure of motion capture data to the structure of H-Anim objects; - HAnim motion capture animation using interpolators, - HAnim motion definition using H-Anim Motion objects, and - A method for generating and specifying an H-Anim motion capture animation. This document specifies a standard technique for exchanging humanoid animation using motion capture. It does not mandate using any specific run-time system to render the H-Anim characters or animations.
Asendab ISO/IEC 19774:2006

ISO/IEC 18013-4:2019
Hind 176,17 EUR
Personal identification -- ISO-compliant driving licence -- Part 4: Test methods
This document describes the test methods used for conformity testing, that is methods for determining whether a driving licence can be considered to comply with the requirements of the ISO/IEC 18013 series for: - machine readable technologies (ISO/IEC 18013-2), and - access control, authentication and integrity validation (ISO/IEC 18013-3). The test methods described in this document are based on specifications defined in ISO/IEC 18013-2 and ISO/IEC 18013-3 and underlying normative specifications. This document deals with test methods specific to IDL requirements. Test methods applicable to (smart) cards in general (e.g. those specified in the ISO/IEC 10373 series) are outside the scope of this document. Hence the purpose of this document is to: - provide IDL implementers with requirements for conformity evaluation, - provide IDL issuing authorities with requirements for quality assurance, and - provide test laboratories and test tool providers with test suite requirements.
Asendab ISO/IEC 18013-4:2011; ISO/IEC 18013-4:2011/Cor 1:2013

ISO/IEC TR 30105-7:2019
Hind 104,99 EUR
Information technology -- IT Enabled Services-Business Process Outsourcing (ITES-BPO) lifecycle processes -- Part 7: Exemplar for maturity assessment
This document presents an exemplar for maturity assessment, following the framework for assessment of process capability levels and measurement of an organization's maturity level for an ITES-BPO service provider. This document: - uses the set of indicators for process performance and process capability; - helps to collect the objective evidence that enables an assessor to determine the process ratings; - helps to assess the result of the process capability level; - serves as a measurement framework for processes and provides an organization maturity model for ITES-BPO organizations delivering the services; - is useful for all users of the ISO/IEC 30105 series, including but not limited to internal assessors, external assessors, ITES-BPO service providers and ITES-BPO service customers; - supports the performance assessment by providing a framework to measure and derive capability and organization maturity levels.

IEC 61784-3-12:2010/AMD1:2019
Hind 8,90 EUR
Amendment 1 - Industrial communication networks - Profiles - Part 3-12: Functional safety fieldbuses - Additional specifications for CPF 12
Amendment for IEC 61784-3-12:2010

IEC 61784-3-12:2010+AMD1:2019 CSV
Hind 400,39 EUR
Industrial communication networks - Profiles - Part 3-12: Functional safety fieldbuses - Additional specifications for CPF 12
IEC 61784-3-12:2010+A1:2019 specifies a safety communication layer (services and protocol) based on CPF 12 of IEC 61784-2 and IEC 61158 Type 12. It identifies the principles for functional safety communications defined in IEC 61784-3 that are relevant for this safety communication layer. This bilingual version (2012-02) corresponds to the monolingual English version, published in 2010-06. This consolidated version consists of the first edition (2010) and its amendment 1 (2019). Therefore, no need to order amendments in addition to this publication.

Asendatud või tühistatud standardid


Puuduvad

Kavandite arvamusküsitlus


prEN ISO 12967-1
Identne ISO/DIS 12967-1; prEN ISO 12967-1
Tähtaeg 15.01.2020
Health informatics - Service architecture (HISA) - Part 1: Enterprise viewpoint (ISO/DIS 12967-1:2019)
as well as for the integration of existing information systems, both within one enterprise and across different healthcare organizations, through an architecture integrating the common data and business logic into a specific architectural layer (i.e. the middleware), distinct from individual applications and accessible throughout the whole information system through services, as shown in Figure 2. This part of ISO 12967 is also independent from, and does not imply either explicitly or implicitly, any specific technological solution or product for its deployment. Accordingly, the formalization of the architecture according to two lower levels of the ODP reference model, the engineering and technology viewpoints, is outside the scope of this part. The language and notations used here for specifying the architecture are based on UML (Unified Modelling Language) complemented by case studies and other paradigms widely utilized by other standards in health informatics. The level of the specification is complete and non-ambiguous enough to allow its implementation into the specific physical and technological scenarios adopted by the various healthcare organizations and vendors. Accordingly, methodology formalized by the Engineering and Technology viewpoints of the RM ODP Reference Model1) can be followed for the implementation.
Keel: Inglise

prEN ISO 12967-2
Identne ISO/DIS 12967-2; prEN ISO 12967-2
Tähtaeg 15.01.2020
Health informatics - Service Architecture (HISA) - Part 2: Information viewpoint (ISO/DIS 12967-2: 2019)
This part of ISO 12967 specifies the fundamental characteristics of the information model to be implemented by a specific architectural layer (i.e. the service architecture) of the information system to provide a comprehensive and integrated storage of the common enterprise data and to support the fundamental business processes of the healthcare organization, as defined in ISO 12967-1. The information model is specified without any explicit or implicit assumption on the physical technologies, tools or solutions to be adopted for its physical implementation in the various target scenarios. The specification is nevertheless formal, complete and non-ambiguous enough to allow implementers to derive an efficient design of the system in the specific technological environment that will be selected for the physical implementation. This specification does not aim at representing a fixed, complete, specification of all possible data that can be necessary for any requirement of any healthcare enterprise. It specifies only a set of characteristics, in terms of overall organization and individual information objects, identified as fundamental and common to all healthcare organizations, and that is satisfied by the information model implemented by the service architecture. Preserving consistency with the provisions of this part of ISO 12967, physical implementations allow extensions to the standard information model in order to support additional and local requirements. Extensions include both the definition of additional attributes in the objects of the standard model, and the implementation of entirely new objects. Also, this standard specification is extensible over time according to the evolution of the applicable standardization initiatives. The specification of extensions is carried out according to the methodology defined in ISO 12967-1:2019, Clause 7, “Methodology for extensions”.
Keel: Inglise

prEN ISO 12967-3
Identne ISO/DIS 12967-3; prEN ISO 12967-3
Tähtaeg 15.01.2020
Health informatics - Service Architecture (HISA) - Part 3: Computational viewpoint (ISO/DIS 12967-3:2019)
HISA specifies fundamental requirements for 'information infrastructure' and healthcare specific ‘service architecture’. This part of ISO 12967 specifies the fundamental characteristics of the computational model to be implemented by a specific architectural layer of the information system (i.e. the service architecture) to provide a comprehensive and integrated interface to the common enterprise information and to support the fundamental business processes of the healthcare organization, as defined in ISO 12967-1. The computational model is specified without any explicit or implicit assumption about the physical technologies, tools or solutions to be adopted for its physical implementation in the various target scenarios. The specification is nevertheless formal, complete and non-ambiguous enough to allow implementers to derive an efficient design of the system in the specific technological environment which will be selected for the physical implementation. The computational model provides the basis for ensuring consistency between different engineering and technology specifications (including programming languages and communication mechanisms) since they must be consistent with the same computational object model. This consistency allows open inter-working and portability of components in the resulting implementation. This specification does not aim at representing a fixed, complete, specification of all possible interfaces that may be necessary for any requirement of any healthcare enterprise. It specifies only a set of characteristics – in terms of overall organization and individual computational objects, identified as fundamental and common to all healthcare organizations, and that are satisfied by the computational model implemented by the service architecture. Preserving consistency with the provisions of this part of ISO 12967, physical implementations shall allow extensions to the standard computational model in order to support additional and local requirements. Extensions shall include both the definition of additional properties in the objects of the standard model and the implementation of entirely new objects. Also, this standard specification shall be extendable over time according to the evolution of the applicable standardization initiatives. The specification of extensions shall be carried out according to the methodology defined in Clause 7 of ISO 12967-1:2019, which identifies a set of healthcare common information services, describing their need and the methodology through which they will be used. These information services are only the minimal set identifiable according to the needs of the healthcare enterprise, and constituting the service architecture (i.e. the integration platform) to serve as the basis for healthcare applications, e.g. EHR or patient administration.
Keel: Inglise

prEN 16157-4
Identne prEN 16157-4
Tähtaeg 15.01.2020
Intelligent transport systems - DATEX II data exchange specifications for traffic management and information - Part 4: VMS publication
This European Standard (EN 16157 series) specifies and defines component facets supporting the exchange and shared use of data and information in the field of traffic and travel. The component facets include the framework and context for exchanges, the modelling approach, data content, data structure and relationships. This European Standard is applicable to: - Traffic and travel information which is of relevance to road networks (non-urban and urban), - Public transport information that is of direct relevance to the use of a road network (e.g. road link via train or ferry service), - Traffic and travel information in the case of Cooperative intelligent transport systems (C-ITS). This European Standard establishes specifications for data exchange between any two instances of the following actors: - Traffic Information Centres (TICs), - Traffic Control Centres (TCCs), - Service Providers (SPs), Use of this European Standard may be applicable for use by other actors. This European Standard series covers, at least, the following types of informational content: - Road traffic event information – planned and unplanned occurrences both on the road network and in the surrounding environment, - Operator initiated actions, - Road traffic measurement data, status data, and travel time data, - Travel information relevant to road users, including weather and environmental information, - Road traffic management information and instructions relating to use of the road network. This part of the CEN/TS 16157 series specifies the informational structures, relationships, roles, attributes and associated data types required for publishing variable message sign information within the Datex II framework. This is specified in two publications, a DATEX II VMS Table Publication sub-model and a VMS Publication sub-model, which are part of the DATEX II platform independent model, but this part excludes those elements that relate to: - location information which are specified in EN 16157-2, - common information elements, which are specified in EN 16157-7, - situation information which are specified in EN 16157-3. The VMS Table Publication supports the occasional exchange of tables containing generally static reference information about deployed VMS which enable subsequent efficient references to be made to pre-defined static information relating to those VMS. The VMS Publication supports the exchange of the graphic and textual content of one or several VMS plus any status information on device configuration that aid the comprehension of the informational content. This content is potentially subject to rapid change. These publications are not intended to support the control or configuration of VMS equipment. Each is part of the DATEX II platform independent model.
Keel: Inglise

prEN IEC 80001-1:2019
Identne IEC 80001-1:201X; prEN IEC 80001-1:2019
Tähtaeg 15.01.2020
Safety, effectiveness and security in the implementation and use of connected medical devices or connected health software - Part 1: Application of risk management
This document specifies a framework of general requirements, guidance, for ORGANIZATIONS in the application of RISK MANAGEMENT before, during and after the connection of a HEALTH IT SYSTEM within a HEALTH IT INFRASTRUCTURE, by addressing the KEY PROPERTIES of SAFETY, EFFECTIVENESS and SECURITY whilst engaging appropriate stakeholders.
Keel: Inglise

prEN ISO/IEC 29134
Tähtaeg 15.01.2020
Information technology - Security techniques - Guidelines for privacy impact assessment (ISO/IEC 29134:2017)
ISO/IEC 29134:2017 gives guidelines for - a process on privacy impact assessments, and - a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations. ISO/IEC 29134:2017 is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.
Keel: Inglise

prEN ISO/IEC 15408-1
Tähtaeg 15.01.2020
Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2009)
ISO/IEC 15408-1:2009 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of ISO/IEC 15408 which in its entirety is meant to be used as the basis for evaluation of security properties of IT products. It provides an overview of all parts of ISO/IEC 15408. It describes the various parts of ISO/IEC 15408; defines the terms and abbreviations to be used in all parts ISO/IEC 15408; establishes the core concept of a Target of Evaluation (TOE); the evaluation context; and describes the audience to which the evaluation criteria are addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given. It defines the various operations by which the functional and assurance components given in ISO/IEC 15408-2 and ISO/IEC 15408-3 may be tailored through the use of permitted operations. The key concepts of protection profiles (PP), packages of security requirements and the topic of conformance are specified and the consequences of evaluation and evaluation results are described. ISO/IEC 15408-1:2009 gives guidelines for the specification of Security Targets (ST) and provides a description of the organization of components throughout the model. General information about the evaluation methodology is given in ISO/IEC 18045 and the scope of evaluation schemes is provided.
Keel: Inglise

prEN ISO/IEC 15408-2
Tähtaeg 15.01.2020
Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2008)
ISO/IEC 15408-2:2008 defines the content and presentation of the security functional requirements to be assessed in a security evaluation using ISO/IEC 15408. It contains a comprehensive catalogue of predefined security functional components that will meet most common security needs of the marketplace. These are organized using a hierarchical structure of classes, families and components, and supported by comprehensive user notes. ISO/IEC 15408-2:2008 also provides guidance on the specification of customized security requirements where no suitable predefined security functional components exist.
Keel: Inglise

prEN ISO/IEC 15408-3
Tähtaeg 15.01.2020
Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance components (ISO/IEC 15408-3:2008)
ISO/IEC 15408-3:2008 defines the assurance requirements of the evaluation criteria. It includes the evaluation assurance levels that define a scale for measuring assurance for component targets of evaluation (TOEs), the composed assurance packages that define a scale for measuring assurance for composed TOEs, the individual assurance components from which the assurance levels and packages are composed, and the criteria for evaluation of protection profiles and security targets. ISO/IEC 15408-3:2008 defines the content and presentation of the assurance requirements in the form of assurance classes, families and components and provides guidance on the organization of new assurance requirements. The assurance components within the assurance families are presented in a hierarchical order.
Keel: Inglise

prEN ISO/IEC 18045
Tähtaeg 15.01.2020
Information technology - Security techniques - Methodology for IT security evaluation (ISO/IEC 18045:2008)
ISO/IEC 18045:2008 is a companion document to ISO/IEC 15408, Information technology - Security techniques - Evaluation criteria for IT security. ISO/IEC 18045:2008 defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 evaluation, using the criteria and evaluation evidence defined in ISO/IEC 15408. ISO/IEC 18045:2008 does not define evaluator actions for certain high assurance ISO/IEC 15408 components, where there is as yet no generally agreed guidance.
Keel: Inglise

prEN ISO/IEC 19790
Tähtaeg 15.01.2020
Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012)
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g. a guarded facility, an office, removable media, and a completely unprotected location). This International Standard specifies four security levels for each of 11 requirement areas with each security level increasing security over the preceding level. ISO/IEC 19790:2012 specifies security requirements specifically intended to maintain the security provided by a cryptographic module and compliance with this International Standard is not sufficient to ensure that a particular module is secure or that the security provided by the module is sufficient and acceptable to the owner of the information that is being protected.
Keel: Inglise

prEN ISO/IEC 27007
Tähtaeg 15.01.2020
Information technology - Security techniques - Guidelines for information security management systems auditing (ISO/IEC 27007:2017)
ISO/IEC 27007 provides guidance on managing an information security management system (ISMS) audit programme, on conducting audits, and on the competence of ISMS auditors, in addition to the guidance contained in ISO 19011:2011. ISO/IEC 27007 is applicable to those needing to understand or conduct internal or external audits of an ISMS or to manage an ISMS audit programme.
Keel: Inglise