Available Standards (3315)
Showing standards 201 - 400

Big data reference architecture — Part 5: Standards roadmap
ISO/IEC TR 20547-2:2018 provides examples of big data use cases with application domains and technical considerations derived from the contributed use cases.

Big data – Cloud computing based requirements and capabilities
Recommendation ITU-T Y.3600 provides requirements, capabilities and use cases of cloud computing based big data as well as its system context.

Big data – Cloud computing based requirements and capabilities
Recommendation Y.3600 provides requirements, capabilities and use cases of cloud computing based big data as well as its system context.

Big-data-driven networking - mobile network traffic management and planning
In a mobile network, a great deal of traffic data which reflects the real status of the mobile network and customers' actual experience is generated all the time.

Biometrics
Standardization of generic biometric technologies pertaining to human beings to support interoperability and data interchange among applications and systems.

Biometrics
Standardization of generic biometric technologies pertaining to human beings to support interoperability and data interchange among applications and systems.

Blind digital signatures -- Part 1: General
This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following va

Blind digital signatures -- Part 1: General
This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following va

Blind digital signatures -- Part 2: Discrete logarithm based mechanisms
This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures.

Blind digital signatures -- Part 2: Discrete logarithm based mechanisms
This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures.

Blockchain and distributed ledger technologies
Overview of and interactions between smart contracts in blockchain and distributed ledger technology systems

Blockchain and distributed ledger technologies
Overview of identity management using blockchain and distributed ledger technologies

Blockchain and distributed ledger technologies
Discovery issues related to interoperability

Blockchain and distributed ledger technologies
Security management of digital asset custodians

Blockchain and distributed ledger technologies - Identifiers of subjects and objects for the design of blockchain systems
This documents define Identifiers of subjects and objects for the design of blockchain systems via Blockchain and distributed ledger technologies.

Blockchain and distributed ledger technologies - Overview of existing DLT systems for identity management
This document provides an overview of existing DLT systems for identity management, i.e.

Blockchain and distributed ledger technologies - Privacy and personally identifiable information protection considerations
This document provides an overview of privacy and personally identifiable information (PII) protection as applied to blockchain and distributed ledger technologies (DLT) systems.

Blockchain and distributed ledger technologies -- Legally binding smart contracts
Blockchain and distributed ledger technologies -- Legally binding smart contracts

Blockchain and distributed ledger technologies -- Privacy and personally identifiable information protection considerations
35.030 IT Security
35.240.99 IT applications in other fields
35.240.40 IT applications in banking

Blockchain and distributed ledger technologies -- Reference architecture
35.030 IT Security
35.240.40 IT applications in banking
35.240.99 IT applications in other fields

Blockchain and distributed ledger technologies -- Security risks, threats and vulnerabilities
35.030 IT Security
35.240.40 IT applications in banking
35.240.99 IT applications in other fields

Blockchain and distributed ledger technologies -- Taxonomy and Ontology
Standardisation of blockchain technologies and distributed ledger technologies.

Blockchain and distributed ledger technologies -- Terminology
35.030 IT Security
35.240.40 IT applications in banking
01.040.35 Information technology (Vocabularies)
35.240.99 IT applications in other fields
Blockchain and DLT - SEEBLOCKS.eu Visualisation Tool
SEEBLOCKS' Visualisation Tool provides a unique collection of materials related to blockchain and distributed ledger standards and standardisation.

Blockchain-based data exchange and sharing for supporting Internet of things and smart cities and communities
Blockchain is an emerging technology, its most important characteristics are traceable, un-erasable, immutable, and time-stamped.

Blockchain-based data management for supporting Internet of things and smart cities and communities
Along with the development of the Internet of things (IoT) and smart cities and communities (SC&C), various applications have different kinds of requirements for data management, and there are

Blockchain/Distributed Ledger
Blockchain and distributed ledger technology is an innovative and continuously evolving technology.

Browser Testing and Tools Working Group
The mission of the Browser Testing and Tools Working Group is to produce technologies for use in testing, debugging, and troubleshooting of Web applications running in Web browsers.

Browsers and robotics community group
This community group will discuss the applications of web browsers as the computer for controlling robots (robotics, in other words).
Building construction - Organization of information about construction works - Part 3: Framework for object-oriented information (ISO 12006-3:2007)
ISO 12006-3:2007 specifies a language-independent information model which can be used for the development of dictionaries used to store or provide information about construction works.

Building information models - Information delivery manual - Part 1: Methodology and format
This part of ISO 29481 specifies:
Building information models - Information delivery manual - Part 2: Interaction framework
ISO 29481-2:2012 specifies a methodology and format for describing coordination between actors in a building construction project during all life cycle stages.
Building ontology
The Building ontology has been developed to perform as the core module of the BIMERR Ontology Network, containing information related to building topology, and components.

Business Requirement Specification Supply Chain Reference Data Model
The Supply Chain Reference Data Model (SCRDM) Business Requirement Specification (SCRDM BRS), in combination with the UN/CEFACT business process International Supply Chain Reference Model (ISCRM) a

Business requirements for end‐to‐end visibility of logistics flow
This document specifies three business requirements for the visibility of logistics traffic flow based on the use cases and gap analysis in Annex A. It includes

Business Requirements Specification Cross Industry Quotation Process
The Quotation process is used by a customer to obtain an offer fr

Business Requirements Specification Cross Industry Quotation Process
Specification that describes the business processes and requirements for the Quotation process. This section describ

Business Requirements Specification - Cross Industry Invoicing Process
The current practice of the exchange of business documents by means of telecommunications – 65 usually defined as e-Business presents a major opportunity to improve the competitiveness of 66 compan

Business Requirements Specification Cross Industry Invoicing
Specification that describes the business process and requirements for the invoicing process.

Business Requirements Specification Cross Industry Ordering Process
Specification that describes the business processes and requirements for the ordering process.

Business Requirements Specification Cross Industry Scheduling Process v2.0
This BRS details the requirements for the Scheduling processes. The scheduling process supports various demand and supply modes, such as Kanban, Synchronized, MRP or VMI (CPFR).

C-SON Evolution for 5G, Hybrid SON Mappings to the ETSI GANA Model, and achieving E2E Autonomic (Closed-Loop) Service Assurance for 5G Network Slices by Cross-Domain Federated GANA Knowledge Planes
This Technical White Paper No.1 is about Demo-1 and Demo-2 (of a series of Demos planned for 2

CABLE; DOCSIS® Layer 2 Virtual Private Networking
The present document describes requirements on both CMTSs and CMs in order to implement a DOCSIS® Layer-2 Virtual Private Network (DOCSIS® L2VPN) feature.

Call for Technologies: MPAI-MMM - Architecture
This document is a Call for Technologies (CfT) for the MPAI Metaverse Model (MPAI-MMM) - Architecture Technical Specification.
Cards and security devices for personal identification
SC 17 continues to deliver card standards that are ubiquitous in their use by the worldwide cards industry.

Cards and security devices for personal identification
SC 17 continues to deliver card standards that are ubiquitous in their use by the worldwide cards industry.

Cards and security devices for personal identification -- Contactless proximity objects -- Part 1: Physical characteristics
ISO/IEC 14443-1:2018 defines the physical characteristics of proximity cards (PICCs).
ISO/IEC 14443-1:2018 is intended to be used in conjunction with other parts of ISO/IEC 14443.

Cards and security devices for personal identification -- Contactless proximity objects -- Part 1: Physical characteristics
ISO/IEC 14443-1:2018 defines the physical characteristics of proximity cards (PICCs).
ISO/IEC 14443-1:2018 is intended to be used in conjunction with other parts of ISO/IEC 14443.

Cards and security devices for personal identification -- Contactless vicinity objects -- Part 2: Air interface and initialization
This document specifies the nature and characteristics of the fields to be provided for power and bi-directional communications between vicinity coupling devices (VCDs) and vicinity cards (VICCs).

Cards and security devices for personal identification -- Contactless vicinity objects -- Part 2: Air interface and initialization
This document specifies the nature and characteristics of the fields to be provided for power and bi-directional communications between vicinity coupling devices (VCDs) and vicinity cards (VICCs).

Cascading Style Sheets working group
The mission of the group is to develop and maintain CSS.

Catalogue of architectural and design principles for secure products, systems and applications
This document provides a catalogue of architectural and design principles that can be used in the development of secure products, systems and applications together with guidance on how to use those

Catalogue of architectural and design principles for secure products, systems and applications
This document provides a catalogue of architectural and design principles that can be used in the development of secure products, systems and applications together with guidance on how to use those

CDN Interconnection Use Case Specification and High-Level Requirements
Regional cloud providers that operate data centers and associated wide-area networking across their region are well positioned to cooperatively build a global cloud infrastructure with other region

CDN Interconnection Use Cases and Requirements for Multicast-Based Content Distribution
The concept of a Federated Cloud comprised of interconnected Service Providers (SP) was introduced in ATIS Standard ATIS-0200003, CDN Interconnection Use Case Specifications and High Level Requirem

CEN-CENELEC Focus Group on Cybersecurity
The Focus Group on Cybersecurity (CSCG) will support CEN and CENELEC to explore ways and means for supporting the growth of the Digital Single market.

CEN/TC 224 - Personal identification and related personal devices with secure element, systems, operations and privacy in a multi sectorial environment
CEN/TC 224 multi-sectorial environment involves sectors such as Government/Citizen, Transport, Banking, e-Health, as well as Consumers and providers from the supply side such as card manufacturers,

CEN/TC 434 - Electronic Invoicing
CEN/TC 434 Subcommittees and Working Groups
CEN/TC 434/WG 1 Core semantic data model
CEN/TC 434/WG 3 Syntax bindings
CEN/TC 434/WG 4 Guidelines at transmission level

CEN/TC 440 - Electronic Public Procurement
Standardization in the field of e-procurement to support the electronic public procurement processes and their accompanying information flows in the physical and financial supply chain.

Chairman advisory group
Preparation of a first draft business plan - Review the task list ( N08) provided by the CEN-CLC Cybersecurity Coordination Group (CSCG) and asses how these tasks could be taken up in the upcoming

Check character systems
This International Standard specifies a set of check character systems capable of protecting strings against errors which occur when people copy or type data.

Check character systems
This International Standard specifies a set of check character systems capable of protecting strings against errors which occur when people copy or type data.

Circular economy in information and communication technology; definition of approaches, concepts and metrics
Supplement 28 to ITU-T L-series Recommendations investigates current approaches, concepts
and metrics of CE and RE and their applicability for ICT infrastructure goods.

Circular Economy — Product Circularity Data Sheet
The document provides a general methodology for improving the accuracy and completeness of circular economy related information based on the usage of a Product Circularity Data Sheet when acquiring

Circular economy: Definitions and concepts for material efficiency for information and communication technology
|

Circular economy: Guide for operators and suppliers on approaches to migrate towards circular ICT goods and networks
This Recommendation suggests approaches of circular economy (CE) for information and communication technology (ICT) goods and networks.

Classification of Everyday Living Version 1.0
The COEL Specification provides a clear and robust framework for implementing a distributed system

Cleaning robots for household use
This standard is applicable to dry cleaning robots for household use in or under conditions similar to those in households.The purpose of this standard is to specify the essential performance characte
Clear Site Data
This document defines an imperative mechanism which allows web developers to instruct a user agent to clear a site’s locally stored data related to a host.

Clinical IoT Data and Device Interoperability
The IEEE Standards Association (IEEE SA) pre-standards workstream for Clinical Internet of Things (IoT) data validation and interoperability with blockchain was initiated to determine if a viable s

Clothing - Digital fittings - Part 1: Vocabulary and terminology used for the virtual human body
This document is the first of a family of standards.
Clothing - Digital fittings - Part 2: Vocabulary and terminology used for attributes of the virtual human body
ISO 18825-2:2016 defines the terms used to describe the virtual human body which is used in virtual garment systems. Specifically, virtual body landmarks and virtual body dimensions are described.
Clothing - Digital fittings - Vocabulary and terminology used for the virtual garment
ISO 18133:2016 defines the terms that are commonly used for the digital fitting system.
Cloud Application Management for Platforms Version 1.1
This document defines the artifacts and APIs that need to be offered by a Platform as a Service (PaaS) cloud to manage the building, running, administration, monitoring and patching of applications

Cloud Application Management for Platforms Version 1.2
This document defines the artifacts and APIs that need to be offered by a Platform as a Service (PaaS) cloud to manage the building, running, administration, monitoring and patching of applications

Cloud Application Management for Platforms Version 1.2 (CAMP 1.2)
This document defines the artifacts and APIs that need to be offered by a Platform as a Service (PaaS) cloud to manage the building, running, administration, monitoring and patching of applications

Cloud Audit Data Federation - OpenStack Profile (CADF-OpenStack 1.1.0 A CADF Representation for OpenStack
This document makes use of the common meta-model used by CADF, the Cloud Audit Data Federation to describe the events used by the OpenStack Cloud Management Platform.

Cloud Auditing Data Federation (CADF) - Data Format and Interface Definitions Specification 1.0.0
Concerns over cloud provider security remain one of the top inhibitors to adoption of cloud deployment models.

Cloud Auditing Data Federation (CADF) Working Group
The Cloud Auditing Data Federation Working Group (CADF) sets out to resolve major problems with the inconsistency, incompatibility, and even inability of existing cloud and service audit interfaces

Cloud computing - Data model framework for NaaS OSS virtualized network function
Draft new Recommendation ITU-T Y.ccvnf-dm: "Cloud computing - Data model framework for NaaS OSS virtualized network function"

Cloud computing - Framework of risk management
This Recommendation describes the framework of risk management in cloud computing, including risk assessment, risk treatment, risk acceptance, risk communication, risk monitoring and review, etc.

Cloud computing - Functional architecture of Big Data as a Service
Recommendation ITU-T Y.3519 describes the functional architecture for big data as a service (BDaaS).

Cloud computing - Functional architecture of big data as a service
Recommendation ITU-T Y.3519 describes the functional architecture for big data as a service (BDaaS).

Cloud computing - Functional architecture of inter-cloud computing
Recommendation ITU-T Y.3516 specifies inter-cloud computing functional architecture, including functions and functional components, based on the inter-cloud computing framework specified in [ITU-T

Cloud computing - functional requirements for blockchain as a service
Draft new Recommendation ITU-T Y.BaaS-reqts: Cloud computing - functional requirements for blockchain as a service

Cloud computing - Functional requirements for cloud service brokerage
Cloud service brokerage is a service that arbitrates, delivers, and manages cloud services provided by cloud service providers for cloud service customers.

Cloud computing - Functional requirements for Robotics as a Service
Provides cloud computing requirements for Robotics as a Service, which addresses requirements from use cases.
Cloud computing - Functional requirements of Infrastructure as a Service
Recommendation ITU-T Y.3513 introduces the concept of Infrastructure as a Service (IaaS) and describes its functional requirements.

Cloud computing - functional requirements of inter-cloud data management
Cloud computing - Functional requirements of Network as a Service

Cloud computing - Functional requirements of Network as a Service
Recommendation ITU-T Y.3512 describes the concept of Network as a Service (NaaS) and its functional requirements.

Cloud computing - Functional requirements of physical machine
The physical machine is a type of computing machine to provide physical resources.

Cloud computing - Overview and functional requirements for data storage federation
This Recommendation provides overview and functional requirements of data storage federation.

Cloud computing - Overview and high-level requirements of distributed cloud
Recommendation ITU-T Y.3508 provides an overview and high-level requirements for distributed cloud.

Cloud computing - Overview of inter-cloud trust management
Recommendation ITU-T Y.3517 provides an overview of inter-cloud trust management by specifying isolation and security management mechanisms, inter-cloud trust management model, reputation-based tru

Cloud computing - Requirements for cloud service development and operation management
Draft Recommendation ITU-T Y.cccsdaom-reqts: Cloud computing - Requirements for cloud service development and operation management

Cloud Computing - Requirements for Containers
This Recommendation specifies the overview and requirements of containers.

Cloud Computing - Requirements of edge cloud management
Draft new Recommendation ITU-T Y.ccecm: "Cloud Computing - Requirements of edge cloud management"

Cloud computing - Trusted inter-cloud computing framework and requirements
This Recommendation specifies a framework of trusted inter-cloud computing and relevant use cases.

Cloud computing -- Best practices for cloud SLA metrics
In most cases, cloud service providers (CSPs) and cloud service customers (CSCs) negotiate service level agreements (SLAs) which include service level objectives (SLOs) and service qualitative obje

Cloud computing -- Best practices for cloud SLA metrics
In most cases, cloud service providers (CSPs) and cloud service customers (CSCs) negotiate service level agreements (SLAs) which include service level objectives (SLOs) and service qualitative obje

Cloud computing -- Service level agreement (SLA) framework -- Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.

Cloud computing -- Service level agreement (SLA) framework -- Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.

Cloud computing -- Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
This document specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance.

Cloud computing -- Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
This document specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance.

Cloud Computing -Functional architecture for cloud service brokerage
This Recommendation describes functional architecture for cloud service brokerage (CSB).

Cloud Computing -Functional requirements of cloud service partner for multi-cloud
The purpose of this Recommendation is to describe the overview of multi-cloud and the functional requirements of cloud service partner for supporting multi-cloud by identifying the various use case

Cloud Computing and Distributed Platforms
Standardization in the areas of Cloud Computing and Distributed Platforms including:

Cloud Computing and Distributed Platforms
Standardization in the areas of Cloud Computing and Distributed Platforms including:

Cloud computing framework for end to end resource management
Recommendation ITU-T Y.3520 presents general concepts of end to end resource management in cloud computing; a vision for adoption of cloud resource management in a telecommunication-rich environmen

Cloud computing infrastructure capabilities interoperability testing – part 1: Interoperability testing between the CSC and CSP
Recommendation ITU-T Q.4041.1 specifies the cloud computing infrastructure capabilities type interoperability testing between the CSC and CSP, including interoperability testing of computing servic

Cloud computing infrastructure requirements
Recommendation ITU-T Y.3510 provides requirements for cloud computing infrastructure; these include the essential capabilities for processing, storage and networking resources, as well as the capab

Cloud computing maturity requirements and framework
This Recommendation provides functional framework and requirements for cloud computing maturity.

Cloud Computing Service Metrics Description
This document proposes a framework that identifies and characterizes the information and relationships needed to describe and measure properties of cloud services that are representative, accurate

Cloud Computing Synopsis and Recommendations
Cloud computing allows computer users to conveniently rent access to fully featured applications, to software development and deployment environments, and to computing infrastructure assets such as

Cloud computing – Cloud services and devices: data flow, data categories and data use — Part 1: Fundamentals
Cloud computing data flow, data categories and data use: Fundamentals

Cloud computing – Cloud services and devices: data flow, data categories and data use — Part 1: Fundamentals
Cloud computing data flow, data categories and data use: Fundamentals

Cloud computing – Framework and high-level requirements

Cloud computing – Functional architecture of Network as a Service

Cloud computing – Overview and high-level requirements of distributed cloud
Recommendation ITU-T Y.3508 provides an overview and high-level requirements for distributed cloud.

Cloud computing – Trusted inter-cloud computing framework and requirements
Recommendation ITU-T Y.3514 specifies a framework of trusted inter-cloud computing and relevant use cases.

Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.

Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.

Cloud computing- functional requirements for machine learning as a service
Draft new Recommendation ITU-T Y.MLaaS-reqts: "Cloud computing- functional requirements for machine learning as a service"

Cloud Control Matrix
The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in asses

Cloud Controls Matrix Working Group
The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in asses

Cloud Customer Architecture for API Management
Cloud Customer Architecture for API Management is an introduction to API Management and the architecture elements of an effective API Management Platform.

Cloud Customer Architecture for Big Data and Analytics V2.0
Cloud Customer Architecture for Big Data and Analytics describes the architectural elements and cloud components needed to build out big data and analytics solutions.

Cloud Customer Architecture for Big Data and Analytics V2.0
Cloud Customer Architecture for Big Data and Analytics describes the architectural elements and cloud components needed to build out big data and analytics solutions.

Cloud Customer Architecture for Blockchain
Blockchain technology has the potential to have a major impact on how institutions process transactions and conduct business.

Cloud Customer Architecture for Blockchain
Blockchain technology has the potential to have a major impact on how institutions process transactions and conduct business.

Cloud Customer Architecture for e-Commerce
Cloud Customer Architecture for e-Commerce describes how to support e-Commerce solutions using cloud computing.

Cloud Customer Architecture for Enterprise Social Collaboration
Cloud Customer Architecture for Enterprise Social Collaboration describes how to leverage social collaboration tools to harness ideas, exchange information, and increase the speed of innovation acr

Cloud Customer Architecture for Enterprise Social Collaboration
Cloud Customer Architecture for Enterprise Social Collaboration describes how to leverage social collaboration tools to harness ideas, exchange information, and increase the speed of innovation acr

Cloud Customer Architecture for Hybrid Integration
Cloud Customer Architecture for Hybrid Integration introduces a core reference architecture and key concepts for hybrid integration in the enterprise.

Cloud Customer Architecture for Hybrid Integration
Cloud Customer Architecture for Hybrid Integration introduces a core reference architecture and key concepts for hybrid integration in the enterprise.

Cloud Customer Architecture for IoT
Cloud Customer Architecture for IoT is a reference architecture for supporting the Internet of Things (IoT) using cloud computing.

Cloud Customer Architecture for Mobile
Cloud Customer Architecture for Mobile describes vendor-neutral best practices for hosting the services and components required to support mobile apps using cloud computing.

Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services was written as practical reference to help IT architects and IT security professionals architect, install, and operate the infor

Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services was written as practical reference to help IT architects and IT security professionals architect, install, and operate the infor

Cloud Customer Architecture for Web Application Hosting
Cloud Customer Architecture for Web Application Hosting describes vendor-neutral best practices for hosting web applications using cloud computing.

Cloud Data Management Interface (CDMI)
The Cloud Data Management Interface defines the functional interface that applications will use to create, retrieve, update and delete data elements from the Cloud.

Cloud Framework for Telepresence Service
The ATIS Cloud Services Forum is examining a number of services that establish the foundation for development, operations, deployment, and management of cloud-based services.

Cloud Incident Response
With today’s fast-evolving threat landscape, a holistic cloud incident response framework that considers an expansive scope of factors for cloud outages is necessary.

Cloud Infrastructure Management Interface (CIMI) Model and REST Interface over HTTP Specification 2.0.0 An Interface for Managing Cloud Infrastructure
The DSP0263 specification describes the model and protocol for management interactions between a cloud Infrastructure as a Service (IaaS) Provider and the Consumers of an IaaS service.

Cloud Infrastructure Management Interface - Common Information Model (CIMI-CIM) 1.0.0 A CIM Representation of the CIMI Model
This document makes use of the common meta-model used by CIM, the Common Information Model to describe the CIMI logical model. This is defined in DSP004, CIM Infrastructure Specification 2.7.

Cloud interoperability testing for web applications – part 1: Interoperability testing between the CSC and CSP
Cloud interoperability for web applications refers to the interaction between the cloud service customer (CSC) and the cloud service provider (CSP) to obtain predictable results, collaboration amon

Cloud Key Management
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between CSPs and key broker services.

Cloud Management Working Group (CMWG)
The DMTF’s Cloud Management Working Group models the management of cloud services and the operations and attributes of the cloud service lifecycle through its work on the Cloud Infrastructure Manag

Cloud Security Services Management
Collaboration and coordination among all stakeholders are critical to secure the cloud platform.

Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate is a guide to security standards, frameworks, and certifications that exist for cloud computing.

Cloud Services Lifecycle Checklist
With the emergence of Cloud Services spanning one or many cloud infrastructures managed by various providers, it is imperative that a checklist be developed that provides cloud services lifecycle g

Cloud Storage Technologies Initiative (CSTI)
The SNIA Cloud Storage Technologies Initiative (CSTI) is committed to the adoption, growth and standardization of storage in cloud infrastructures, including its data services, orchestration and ma

Cloud Storage TWG
The Cloud Storage TWG acts as the primary technical entity for the SNIA to identify, develop, and coordinate systems standards for Cloud Storage.

Cloud Trust Protocol Data Model and API
The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud service customers can ask for and receive information related to the security of the services they use in the cloud, prom

Cloud-based network management functional architecture
Recommendation ITU-T M.3071 introduces a new network management functional architecture with cloud-computing technology.

CLOUD; Test Descriptions for Cloud Interoperability
The present document specifies Interoperability Test Descriptions (TDs) for OCCI and CDMI standards.

CloudAudit
The goal of CloudAudit is to provide a common interface and namespace that allows cloud computing providers to automate the Audit, Assertion, Assessment, and Assurance (A6) of their infrastructure

CloudCISC
Given the longstanding and fervent belief in the value for incident sharing, new advancements in enabling technology, and the promising shifts in the legal landscape, the Cloud Security Alliance be

CMED Feature/Study Item: 3GPP SA1 for Release 17
3GPP SA1 has completed a study (FS_CMED) on the potential requirements and use cases involving usage of 3GPP interoperable communication technologies between medical devices and critical medic

Coded character sets
Scope of the SC : Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchang

Coded character sets
Scope of the SC : Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchang

Coded character sets
Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchange and code extensi

Coded character sets
Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchange and code extensi

Coding of audio, picture, multimedia and hypermedia information
Standardization of coded representation of audio, picture, multimedia and hypermedia information - and sets of compression and control functions for use with such information - such as:

Coding of audio, picture, multimedia and hypermedia information
Standardization of coded representation of audio, picture, multimedia and hypermedia information - and sets of compression and control functions for use with such information - such as:

Collaborative robot systems - Design of systems with "Power and Force Limiting" function
Collaborating robot systems can be used in thefunction "Power and Force Limiting" without the need for traditionallimiting" function without the need for traditionalsuch as fences and light curtains.c
Command Line Protocol Service Profile SM CLP Command Mapping Specification
This specification contains the requirements for an implementation of the SM CLP

Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements
This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evalu

Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements
This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evalu

Competence requirements for information security testers and evaluators -- Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
This document provides the minimum requirements for the knowledge, skills and effectiveness requirements of individuals performing testing activities for a conformance scheme using ISO/IEC 19790 an

Competence requirements for information security testers and evaluators -- Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
This document provides the minimum requirements for the knowledge, skills and effectiveness requirements of individuals performing testing activities for a conformance scheme using ISO/IEC 19790 an

Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators.
This document provides the specialized requirements to demonstrate competence of individuals in performing IT product security evaluations in accordance with ISO/IEC 15408 (all parts)&nbs

Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators.
This document provides the specialized requirements to demonstrate competence of individuals in performing IT product security evaluations in accordance with ISO/IEC 15408 (all parts)&nbs

Computational Storage TWG
The Computational Storage TWG was created for the purpose of establishing architectures and software for storage, disk, and solid state device based

Computer graphics, image processing and environmental data representation
The current area of work for JTC 1/SC 24 consists of:

Computer graphics, image processing and environmental data representation
The current area of work for JTC 1/SC 24 consists of:

Condition monitoring and diagnostics of machines — Prognostics — Part 1: General guidelines
ISO 13381-1:2015 provides guidance for the development and application of prognosis processes. It is intended to

Configuration Management Database (CMDB) Federation Specification
The definition of a CMDB in the context of this specification is based on the de

Confirmation procedures for the application of artefact metrics
This document specifies a process to qualify the suitability, reliability and effectiveness of artefact metrics as well as artefact metric recognition principles for identification and verification

Consumer Product Variant - Implementation Guide
An implementation guide for the implementation of Consumer Product Variant identification in GDSN, identifying variation of a product not requiring change of product identifier (Global Trade Item N
