Edge Computing

Available (207)

Showing 73 - 84 per page



ETSI GS MEC 026 V2.1.1 (2019-01)Multi-access Edge Computing (MEC); Support for regulatory requirements

The document focuses on the support of regulatory requirements for Lawful Interception (LI) and Retained Data (RD) when implementing MEC into the network. It describes the problems, constraints, interfaces and additional capabilities needed for the different deployment scenarios, to ensure full support of LI and RD regulatory requirements when implementing MEC.

ETSI GS MEC 026 V2.1.1 (2019-01)

IEC TR 63283-3 ED1Industrial-process measurement, control and automation - Smart Manufacturing - Part 3: Challenges for Cybersecurity

The document addresses roles of IIoT platforms and edge computing in the context of architecture-related transition from classical automation pyramid to automation networks, particularly related to security issues.

IEC TR 63283-3 ED1

ITU-T - SG17 - X.itssec-5Security guidelines for vehicular edge computing

This draft Recommendation provides security guidelines for vehicular edge computing. Vehicular edge computing (VEC) is a model that supports the core cloud's capacity for decentralizing the concentration of computing resources in data centers. VEC also provides more localized storage and application services to road users, thereby making it possible to achieve lower latency delays, faster response times providing mobility support, location awareness, high availability, and Quality of Service for streaming real-time applications since the data processing is conducted closer to the vehicle. Vehicular edge computing faces many security challenges and issues since it requires providing faster service response time to end-users. This Recommendation provides security guidelines for vehicular edge computing based on an analysis of the threats and vulnerabilities identified within VEC. Further, it also provides use cases for a security system and relevant security requirements for use in for vehicular edge computing scenarios.

ITU-T - SG17 - X.itssec-5

IEC TS 62443-1-1:2009Industrial communication networks - Network and system security - Part 1-1: Terminology, concepts and models

IEC/TS 62443-1-1:2009(E) is a technical specification which defines the terminology, concepts and models for Industrial Automation and Control Systems (IACS) security. It establishes the basis for the remaining standards in the IEC 62443 series.

IEC TS 62443-1-1:2009

ETSI TS 103 701CYBER; Cyber Security for Consumer Internet of Things: Conformance Assessment of Baseline Requirements

The present document specifies a conformance assessment methodology for consumer IoT devices, their relation to associated services and corresponding relevant processes against ETSI TS 103 645 / ETSI EN 303 645, addressing the mandatory and recommended provisions as well as conditions and complements ETSI TS 103 645 / ETSI EN 303 645 by defining test cases and assessment criteria for each provision.

ETSI TS 103 701

ISO/IEC TS 27110:2021Information technology, cybersecurity and privacy protection -- Cybersecurity framework development guidelines

This document specifies guidelines for developing a cybersecurity framework. It is applicable to cybersecurity framework creators regardless of their organizations' type, size or nature.

ISO/IEC TS 27110:2021

ISO/IEC TR 27550:2019Information technology -- Security techniques -- Privacy engineering for system life cycle processes

This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes: the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management); and privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, and architecture design.

ISO/IEC TR 27550:2019

ISO/IEC TS 27570:2021Privacy protection -- Privacy guidelines for smart cities

The document takes a multiple agency as well as a citizen-centric viewpoint. It provides guidance on: smart city ecosystem privacy protection; how standards can be used at a global level and at an organizational level for the benefit of citizens; and processes for smart city ecosystem privacy protection.

ISO/IEC TS 27570:2021

ISO/IEC 27032:2012Information technology -- Security techniques -- Guidelines for cybersecurity

ISO/IEC 27032:2012 provides guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains, in particular: information security, network security, internet security, and critical information infrastructure protection (CIIP). It covers the baseline security practices for stakeholders in the Cyberspace. This International Standard provides: an overview of Cybersecurity, an explanation of the relationship between Cybersecurity and other types of security, a definition of stakeholders and a description of their roles in Cybersecurity, guidance for addressing common Cybersecurity issues, and a framework to enable stakeholders to collaborate on resolving Cybersecurity issues.

ISO/IEC 27032:2012

ISO/IEC CD 30149 (2022)IoT Trustworthiness principles

This document provides principles for IoT trustworthiness based on ISO/IEC 30141 - IoT Reference Architecture. The current content and scope is based on the premise that Internet of Things is an application and can use a software development lifecycle as a means to address trust in IoT.

ISO/IEC CD 30149 (2022)

OMA-TS-GwMO-V1_1-20170725-AGateway Management Object Technical Specification

This technical specification describes Management Objects and Generic Alerts that are needed to provide the DM Gateway functionality, as defined in [DMDICT].

OMA-TS-GwMO-V1_1-20170725-A