OASIS

Available (105)

Showing 49 - 60 per page



KMIP Asymmetric Key Lifecycle Profile v1.0

The OASIS KMIP TC works to define a single, comprehensive protocol for communication between encryption systems and a broad range of new and legacy enterprise applications, including email, databases, and storage devices. By removing redundant, incompatible key management processes, KMIP will provide better data security while at the same time reducing expenditures on multiple products.

KMIP Symmetric Key Lifecycle Profile v1.0

The OASIS KMIP TC works to define a single, comprehensive protocol for communication between encryption systems and a broad range of new and legacy enterprise applications, including email, databases, and storage devices. By removing redundant, incompatible key management processes, KMIP will provide better data security while at the same time reducing expenditures on multiple products.

KMIP Storage Array with Self-Encrypting Drives Profile v1.0

The OASIS KMIP TC works to define a single, comprehensive protocol for communication between encryption systems and a broad range of new and legacy enterprise applications, including email, databases, and storage devices. By removing redundant, incompatible key management processes, KMIP will provide better data security while at the same time reducing expenditures on multiple products.

Authentication Step-Up Protocol and Metadata Version 1.0

The OASIS Trust Elevation TC works to define a set of standardized protocols that service providers may use to elevate the trust in an electronic identity credential presented to them for authentication. The Trust Elevation TC is intended to respond to suggestions from the public sector, including the U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC). The Trust Elevation TC promotes interoperability among multiple identity providers--and among multiple identity federations and frameworks--by facilitating clear communication about common and comparable operations to present, evaluate and apply identity [data/assertions] to sets of declared authorization levels.

OASIS Web Services Secure Exchange (WS-SX) TC

The purpose of the OASIS WS-SX TC is to define extensions to OASIS Web Services Security to enable trusted SOAP message exchanges involving multiple message exchanges and to define security policies that govern the formats and tokens of such messages. This work will be carried out through continued refinement of the Web Services SecureConversation, SecurityPolicy and Trust specifications submitted to the TC as referenced in the charter.

OASIS Topology and Orchestration Specification for Cloud Applications (TOSCA) TC

The OASIS TOSCA TC works to enhance the portability of cloud applications and services across their entire lifecycle. TOSCA will enable the interoperable description of application and infrastructure cloud services, the relationships between parts of the service, and the operational behavior of these services (e.g., deploy, patch, shutdown)--independent of the supplier creating the service, and any particular cloud provider or hosting technology. TOSCA will also make it possible for higher-level operational behavior to be associated with cloud infrastructure management.
 
By increasing service and application portability in a vendor-neutral ecosystem, TOSCA will enable:

  • Portable deployment to any compliant cloud
  • Smoother migration of existing applications to the cloud
  • Flexible bursting (consumer choice)
  • Dynamic, multi-cloud provider applications

Topology and Orchestration Specification for Cloud Applications Version 1.0

Cloud computing can become more valuable if the semi-automatic creation and management of application layer services can be ported across alternative cloud implementation environments so that the services remain interoperable. This core TOSCA specification provides a language to describe service components and their relationships using a service topology, and it provides for describing the management procedures that create or modify services using orchestration processes. The combination of topology and orchestration in a Service Template describes what is needed to be preserved across deployments in different environments to enable interoperable deployment of cloud services and their management throughout the complete lifecycle (e.g. scaling, patching, monitoring, etc.) when the applications are ported over alternative cloud environments.

TOSCA-v1.0

TOSCA Simple Profile in YAML Version 1.2

The TOSCA Simple Profile in YAML specifies a rendering of TOSCA which aims to provide a more accessible syntax as well as a more concise and incremental expressiveness of the TOSCA DSL in order to minimize the learning curve and speed the adoption of the use of TOSCA to portably describe cloud applications.
 
This proposal describes a YAML rendering for TOSCA. YAML is a human friendly data serialization standard (http://yaml.org/) with a syntax much easier to read and edit than XML. As there are a number of DSLs encoded in YAML, a YAML encoding of the TOSCA DSL makes TOSCA more accessible by these communities.
 
This proposal prescribes an isomorphic rendering in YAML of a subset of the TOSCA v1.0 XML specification ensuring that TOSCA semantics are preserved and can be transformed from XML to YAML or from YAML to XML. Additionally, in order to streamline the expression of TOSCA semantics, the YAML rendering is sought to be more concise and compact through the use of the YAML syntax.

TOSCA-Simple-Profile-YAML-v1.2

OASIS Transformational Government Framework TC

The Transformational Government TC advances an overall framework for using information technology to improve the delivery of public services. Unlike traditional e-Government strategies of the past, Transformational Government begins with citizen engagement to assure greater use and return on investment. The work of the TC includes defining the framework, identifying use cases, and providing adoption guidance for governments around the world, regardless of their history in implementing eGov.

OASIS Universal Business Language TC

Defining a common XML library of business documents (purchase orders, invoices, etc.).
 
The aims of the UBL TC shall be as follows:

  1. To avert a crisis in electronic business caused by competing XML business-to-business document standards by choosing as a starting point an existing XML business document library as the basis for creating a new "Universal Business Language" that will be a synthesis of existing XML business document libraries.
  2. To begin with xCBL 3.0 as the starting point and to develop the standard UBL library by mutually agreed-upon changes to xCBL 3.0 based on industry experience with other XML business libraries and with similar technologies such as Electronic Data Interchange.
  3. To develop UBL in light of standards/specifications issued by UN/CEFACT, ISO, IEC, ITU, W3C, IETF, OASIS, and such other standards bodies and organizations as the UBL TC may deem relevant.
  4. To harmonize UBL as far as practical with the ebXML specifications approved in Vienna (May 2001), with the work of the Joint Core Components initiative (a joint project of ANSI ASC X12 and the UN/EDIFACT Working Group), and with the work of other appropriate business information bodies.
  5. To vest ownership of UBL in OASIS, a nonprofit corporation dedicated to the adoption of structured information standards, and to make it freely available to everyone without licensing or other fees.
  6. Ultimately, to promote UBL to the status of an international standard for the conduct of XML-based electronic business.

OASIS Variability Exchange Language (VEL) TC

VEL TC members are developing an interoperability standard that will enable the exchange of variability information among variant management tools and systems development tools. The goal is to enable the exchange of variability information among tools for variant management tools and systems development tools.
 
Variability is a widely used model for describing common and unique features of systems at all stages of the lifecycle. It describes the ability of artifacts to be used in different contexts by changing or customizing some characteristics of them, and those changeable characteristics are localized somewhere within the artifacts. VEL will eliminate the cost of building customized interfaces by defining a standard way for information to be exchanged among corresponding tools. Using VEL, a variant management tool will be able to read the variability from a development tool and pass configurations of selected system features to a development tool. By defining a common variability data interface that can be implemented by both the development tools and the variant management tools, VEL will enable a continuous development process for variable systems and more flexible use of tools.

OASIS Virtual I/O Device (VIRTIO) TC

The goal of the OASIS Virtual I/O Device (VIRTIO) TC is to simplify virtual devices, making them more extensible and more recognizable.
 
The purpose of VIRTIO is to ensure that virtual environments and guests have a straightforward, efficient, standard, and extensible mechanism for virtual devices, rather than boutique per-environment or per-OS mechanisms. PCI devices of the VIRTIO family as found in virtual environments are not all that different from physical PCI devices. Treating them similarly allows the guest to use standard PCI drivers and discovery mechanisms.
 
The TC intends to define formal specifications for virtual device buses (including PCI) for a variety of devices, including network devices. Specification development will be based upon the "Virtio PCI Card Specification" v0.9.5, seeking solutions that support portability, simplicity, least-surprise for driver authors, extensibility, and performance. The specification will also document existing implementations and practice.
 
The expected TC deliverables include:

  • Specification of feature negotiation, configuration and queues, from both driver and device points of view
  • Specification of device-specific configuration
  • Non-normative code examples for operation of guest/host side of buffers
  • Non-normative guide for creating devices which also support previous mode(s)