IT in general

Available (1690)

Showing 649 - 660 per page



Information technology. Automatic identification and data capture techniques. Data Matrix bar code symbology specification

SO/IEC 16022:2006 defines the requirements for the symbology known as Data Matrix. It specifies the Data Matrix symbology characteristics, data character encodation, symbol formats, dimensions and print quality requirements, error correction rules, decoding algorithm, and user-selectable application parameters.
It applies to all Data Matrix symbols produced by any printing or marking technology.
Data Matrix is a two-dimensional matrix symbology which is made up of nominally square modules arranged within a perimeter finder pattern. Though primarily shown and described in ISO/IEC 16022:2006 as a dark symbol on light background, Data Matrix symbols can also be printed to appear as light on dark.
Manufacturers of bar code equipment and users of the technology require publicly available standard symbology specifications to which they can refer when developing equipment and application standards. The publication of standardized symbology specifications is designed to achieve this.

ISO/IEC 16022

Information technology - Data structure - Unique identification for the Internet of Things

ISO/IEC 29161:2016 establishes a unique identification scheme for the Internet of Things (IoT), based on existing and evolving data structures. This International Standard specifies the common rules applicable for unique identification that are required to ensure full compatibility across different identities. The unique identification is a universal construct for any physical object, virtual object, or person. It is used in IoT information systems that need to track or otherwise refer to entities. It is intended for use with any IoT media.

ISO/IEC 29161

Information technology — Security techniques — Storage security

This document provides detailed technical requirements and guidance on how organizations can achieve an appropriate level of risk mitigation by employing a well-proven and consistent approach to the planning, design, documentation, and implementation of data storage security. Storage security applies to the protection of data both while stored in information and communications technology (ICT) systems and while in transit across the communication links associated with storage. Storage security includes the security of devices and media, management activities related to the devices and media, applications and services, and controlling or monitoring user activities during the lifetime of devices and media and after end of use or end of life.

This document provides an overview of storage security concepts and related definitions. It includes requirements and guidance on the threats, design, and control aspects associated with typical storage scenarios and storage technology areas. In addition, it provides references to other International Standards and technical reports that address existing practices and techniques that can be applied to storage security.

ISO/IEC 27040

Information security, cybersecurity and privacy protection — Age assurance systems — Framework

This document establishes core principles, including privacy, for the purpose of enabling agerelated eligibility decisions, by setting out a framework for indicators of confidence about age or an age range of a natural person.

ISO/IEC 27566

IT Security and Privacy — A framework for identity management — Part 2: Reference architecture and requirements

ISO/IEC 24760-2:2015
provides guidelines for the implementation of systems for the management of identity information, and
specifies requirements for the implementation and operation of a framework for identity management.
ISO/IEC 24760-2:2015 is applicable to any information system where information relating to identity is processed or stored.

ISO/IEC 24760-2

IEEE/ISO/IEC 8802-1AE-2020ISO/IEC/IEEE - Telecommunications and exchange between information technology systems -- Requirements for local and metropolitan area networks--Part 1AE: Media access control (MAC) security - Tag control information figure

How all or part of a network can be secured transparently to peer protocol entities that use the MAC Service provided by IEEE 802 LANs to communicate is specified in this standard. MAC security (MACsec) provides connectionless user data confidentiality, frame data integrity, and data origin authenticity.

IEEE/ISO/IEC 8802-1AE-2020

IEEE/ISO/IEC 8802-1BA-2016ISO/IEC/IEEE International Standard - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 1BA: Audio video bridging (AVB) systems

Profiles that select features, options, configurations, defaults, protocols and procedures of bridges, stations and LANs that are necessary to build networks that are capable of transporting time-sensitive audio and/or video data streams are defined in this standard.

IEEE/ISO/IEC 8802-1BA-2016

IEC 62541-5:2020OPC Unified Architecture - Part 5: Information Model

IEC 62541-5:2020 which contains the International Standard and its Redline version, showing all changes of the technical content compared to the previous edition. IEC 62541-5:2020 defines the Information Model of the OPC Unified Architecture. The Information Model describes standardized Nodes of a Server's AddressSpace. These Nodes are standardized types as well as standardized instances used for diagnostics or as entry points to server-specific Nodes. Thus, the Information Model defines the AddressSpace of an empty OPC UA Server. However, it is not expected that all Servers will provide all of these Nodes. This third edition cancels and replaces the second edition published in 2015. This edition constitutes a technical revision. This edition includes the following significant technical changes with respect to the previous edition: a) Added Annex F on User Authentication. Describes the Role Information Model that also allows configuration of Roles. b) Added new data types: "Union", "Decimal", "OptionSet", "DateString", "TimeString", "DurationString", NormalizedString", "DecimalString", and "AudioDataType". c) Added Method to request a state change in a Server. d) Added Method to set Subscription to persistent mode. e) Added Method to request resending of data from a Subscription. f) Added concept allowing to temporarily create a file to write to or read from a server in C.4. g) Added new Variable type to support Selection Lists. h) Added optional properties to FiniteStateMachineType to expose currently available states and transitions. i) Added UrisVersion Property to ServerType. This version information can be used for session-less service invocation.

IEC 62541-5:2020

IEC 62714-3:2017Engineering data exchange format for use in industrial automation systems engineering - Automation markup language - Part 3: Geometry and kinematics

IEC 62714-3:2017 specifies the integration of geometry and kinematics information for the exchange between engineering tools in the plant automation area by means of AML.

IEC 62714-3:2017

ISO 20140-5:2017 Automation systems and integration - Evaluating energy efficiency and other factors of manufacturing systems that influence the environment - Part 5: Environmental performance evaluation data

ISO 20140-5:2017 specifies the types of environmental performance evaluation (EPE) data, including their attributes, which can be used for evaluating the environmental performance of manufacturing systems based on the general principles described in ISO 20140_1. It also provides recommendations for mapping the EPE data on to information models specified by IEC 62264. ISO 20140-5:2017 applies to discrete, batch and continuous manufacturing. ISO 20140-5:2017 is applicable to entire manufacturing facilities and to parts of a manufacturing facility. ISO 20140-5:2017 specifically excludes from its scope the syntax of the data and information models, the protocols to exchange data models, the functions that can be enabled by data models, and the activities in Level 1 and Level 2. The scope of ISO 20140-5:2017 also includes indicating the differences among various data and information models and the differences among various representations of environmental performance by actual data. ISO 20140-5:2017 refers to the semantics of the structured data and information models used by communication protocols. The semantics explain the meaning of the attributes and of the context information. The following are outside the scope of ISO 20140-5:2017: a) product life cycle assessment; b) EPE data that are specific to a particular industry sector, manufacturer or machinery; c) acquisition of data; d) the activity of data communication.

ISO 20140-5:2017

IEC 62443-4-2:2019 Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components

IEC 62443-4-2:2019 provides detailed technical control system component requirements (CRs) associated with the seven foundational requirements (FRs) described in IEC TS 62443-1-1 including defining the requirements for control system capability security levels and their components, SL-C (component). As defined in IEC TS 62443-1-1 there are a total of seven foundational requirements (FRs): a) identification and authentication control (IAC), b) use control (UC), c) system integrity (SI), d) data confidentiality (DC), e) restricted data flow (RDF), f) timely response to events (TRE), and g) resource availability (RA). These seven FRs are the foundation for defining control system security capability levels. Defining security capability levels for the control system component is the goal and objective of this document as opposed to SL-T or achieved SLs (SL-A), which are out of scope. Show less

IEC 62443-4-2:2019