Available Standards (3315)
Showing standards 401 - 600

Consumer protection - Privacy by design for consumer goods and services - Part 2: Use cases
This document provides illustrative use cases, with associated analysis, chosen to assist in understanding the requirements of 31700-1.
Content Delivery Networks Interconnection Working Group
The significant growth in content delivered over IP networks, existing CDN providers are scaling up their infrastructure and many Network Service Providers and Enterprise Service

Content Security Policy Level 3
This document defines a mechanism by which web developers can control the resources which a particular page can fetch or execute, as well as a number of security-relevant policy decisions.

Context Information Management (CIM) - Use Cases (UC)
The present document discusses the concepts which are foundational for Cross-Cutting Context Information Management (C3IM) and their application to a selection of Use Cases from the domains of Smar

Context Information Management (CIM) Recommendations for NGSI-LD Interworking
* Recognizing the value of obtaining interworking between information created/modified/published via oneM2M or NGSI-LD or other systems, this Work Item will investigate the degree of alignment betw

Context Information Management (CIM): Information Model (MOD0):
The purpose of this Group Specification is to define or identify a cross-domain data model compatible with the CIM API defined in WI API0, for use in testing that preliminary API specification.

Context Information Management (CIM): NGSI-LD API
This Group Specification provides additions and corrections to the GS-009 NGSI-LD API specification, based on feedback received from developers in the linked-data, internet-of-things, mobile-apps a

Context Information Management (CIM): Application Programming Interface (API)
The purpose of this Group Specification is the (preliminary) definition of a standard API for Context Information Management (CIM-API) enabling close to real-time access to information coming from

Context Information Management (CIM): NGSI-LD Primer:
The purpose of this Group Report is to explain with examples the usage of NGSI-LD information model and API, as defined in GS-004 prelimAPI, and considering also some use cases from GR-002 for IC

Context Information Management (CIM); NGSI-LD Testing Framework: Test Template
The Testing Framework (document format) specifies a testing framework defining a methodology for the development of the test strategies, test systems and resulting test s

Context Information Management (CIM);NGSI-LD Testing Framework: Test Purposes Description Language (TPDL)
The present document is a choice of Test Purposes Description Language (TPDL), with the intention to capture all of the information required by the Test Template and shou

Context-Aware System Ontology (CASO)
CASO (Context Aware System Observation) is an ontology for context aware system and observation services. Its goal is to describe all the processing of the context.

Continuation & integration of HGI Smart Home activities
The present document is a study of the continuation and integration of some HGI Smart Home activities into oneM2M, following the (PT2) HGI announcement of its closure by June 2016.

Convergence of Social, Mobile and Cloud: 7 Steps to Ensure Success
Convergence of Social, Mobile and Cloud: 7 Steps to Ensure Success is a practical reference to help enterprise information technology (IT) and business decision makers analyze and consider the impl

Convergence of Social, Mobile and Cloud: 7 Steps to Ensure Success
Convergence of Social, Mobile and Cloud: 7 Steps to Ensure Success is a practical reference to help enterprise information technology (IT) and business decision makers analyze and consider the impl

Core banking — Mobile financial services — Part 1: General framework
ISO 12812-1:2017 defines the general framework of mobile financial services (payment and banking services involving a mobile device), with a focus on:

Core banking — Mobile financial services — Part 2: Security and data protection for mobile financial services
ISO 12812-2:2017 describes and specifies a framework for the management of the security of MFS. It includes
- a generic model for the design of the security policy,

Core banking — Mobile financial services — Part 3: Financial application lifecycle management
ISO/TS 12812-3:2017 specifies the interoperable lifecycle management of applications used in mobile financial services.

Core banking — Mobile financial services — Part 4: Mobile payments-to-persons
ISO/TS 12812-4:2017 provides comprehensive requirements and recommendations, as well as specific use cases for implementation of interoperable mobile payments-to-persons.

Core Components Technical Specification – Part 8 of the ebXML Framework
The UN/CEFACT Core Components Technical Specification describes and specifies a new approach to the well-understood problem of the lack of information interoperability between applications in the e

Core Network and Interoperability Testing (INT/WG AFI); Federated GANA Knowledge Planes (KPs) for Multi-Domain Autonomic Management & Control (AMC) of Slices in the NGMN® 5G End-to-End Architecture Framework
As part of the growing area of Autonomic/Autonomous Networks (ANs), the document covers the subject of Federated GANA Knowledge Planes (KPs) Platforms for E2E Multi-Domain Federated Autonomic Manageme
Correct evaluation of collaborative robot safety (Focus on IFA works No. 0419)
This document gives guidance for measuring forces and pressures in human-robot collision.
Credential Management Level 1
This specification describes an imperative API enabling a website to request a user’s credentials from a user agent, and to help the user agent correctly store user credentials for future use.

Credential Manifest 0.0.1
Credential Manifests are a resource format that defines preconditional requirements, Issuer style preferences, and other facets User Agents utilize to help articulate and select the inputs necessar

Cross Industry Catalogue Information Process
This section describes the extent and limits of the business processes withi

Cross Industry Invoice version D16B
Generic electronic invoicing standard, containing of an executive guide, business requirements specification, requirements mapping and an XML schema.

Cryptographic algorithms and security mechanisms conformance testing
This document gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods.

Cryptographic algorithms and security mechanisms conformance testing
This document gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods.

Cryptographic techniques based on elliptic curves -- Part 1: General
This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC 979

Cryptographic techniques based on elliptic curves -- Part 1: General
This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC 979

Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.

Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.

CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2
The OASIS CSAF Technical Committee is chartered to make a major revision to the Common Vulnerability Reporting Framework (CVRF) under a new name for the framework that reflects the primary purpose:
CWL, Common Workflow Language Standards, v1.2
The Common Workflow Language (CWL) is an open standard for describing analysis workflows and tools in a way that makes them portable and scalable across a variety of soft

Cyber Security for Consumer Internet of Things
The present document specifies high-level provisions for the security of consumer devices that are connected to network infrastructure, such as the Internet or home network, and their associated se

Cyber Security for Consumer Internet of Things: Conformance Assessment of Baseline Requirements
The present document specifies a conformance assessment methodology for consumer IoT devices, their relation to associated services and corresponding relevant processes against ETSI TS 103 645 [1]

Cybersecurity and ISO and IEC Standards
This document provides guidance on how to leverage existing standards in a cybersecurity framework.

Cybersecurity and ISO and IEC Standards
This document provides guidance on how to leverage existing standards in a cybersecurity framework.

D-Cinema Operations — Auditorium Security Messages for Intra-Theater Communications
The Auditorium Security Message (ASM) specification enables interoperable communication of security-critical information (information neces

Darwin Information Typing Architecture(DITA) Version 1.3
The Darwin Information Typing Architecture (DITA) is an XML-based architecture for authoring, producing, and

Data aware networking (information centric networking) – Requirements and capabilities
This Recommendation specifies the requirements and capabilities of data aware networking (DAN) to realize the use cas

Data exchange for meters on bus-systems and interface
Maintain EN 1434-3, preparing a draft revision, taking into account: - to improve the reference to the ISO/OSI physical- and linklayer; - to enable CEN/TC 294 DLMS-Protocol to be used on the physic

Data Format Description Language (DFDL) v1.0 Specification
This document provides a definition of a standard Data Format Description Language (DFDL).

Data Format Description Language WG (DFDL-WG)
The aim of this working group is to define an XML-based language, the Data Format Description Language (DFDL), for describing the structure of binary and textual files and data streams so that thei

Data management and interchange
Standards for data management within and among local and distributed information systems environments.

Data management and interchange
Standards for data management within and among local and distributed information systems environments.

Data management and interchange
Standards for data management within and among local and distributed information systems environments.

Data Protection, Privacy and Identity Management
Data Protection, Privacy and Identity Management

Data quality
ISO 8000 is the global standard for Data Quality and Enterprise Master Data. It describes the features and defines the requirements for standard exchange of Master Data among business partners.

Data quality - Part 1: Overview
This document is the first of a family of standards. This document provides an overview of the ISO 8000 series. The following are within the scope of this document:
Data quality - Part 210: Sensor data: Data quality characteristics
This deliverable specifies quality characteristics of data that is recorded by sensors as a stream of single, discrete digital values by sensors.
Data quality - Part 220: Sensor data: Quality measurement
This deliverable specifies quality measures for quantitatively measuring quality characteristics of sensor data, where these characteristics are specified by ISO 8000-210.
Data Residency Challenges
As data is increasingly accessed and shared across geographic boundaries, a growing web of conflicting laws and regulations dictate where data can be transferred, stored, and shared, and how it is

Data security requirements for the monitoring service of cloud computing
Recommendation ITU-T X.1603 analyses data security requirements for the monitoring service of cloud computing which includes monitoring data scope requirements, monitoring data lifecycle, security

Data structures for electronic product catalogues for building services - Part 2: Geometry
ISO 16757-2:2016 describes the modelling of building services product geometry. The description is optimized for the interchange of product catalogue data and includes
Dataset Exchange Working Group (DXWG)
The mission of the Dataset Exchange WG is to: 1.

Decentralised Identity Management Model based on Blockchain and other Distributed Ledgers Technologies — Part 1: Generic Reference Framework
The proposed standard will specify a reference architecture for decentralised identity management, optionally enabled by distributed ledger technology (DLT) and blockchain systems.

Decentralized Identifier Resolution (DID Resolution) v0.3
A protocol to resolve any given DID. Resolving a DID leads to e.g. the Verifiable Credentials of a product or organisation.

Decentralized Identifier Working Group
The mission of the Decentralized Identifier Working Group is to standardize the DID URI scheme, the data model and syntax of DID Documents, which contain information related to DIDs that enable the

Decentralized Identifiers (DIDs) v1.0, Core architecture, data model, and representations
Decentralised Identifiers are a mean to identify anything on the Internet. In the DPP case suitable to identify products, organisations, machines and also humans.

Decentralized Identity standard for the identification of subjects and objects
A standard for the design and use of decentralized and self-sovereign identification of subjects (legal entities and natural persons) and objects, assets within the design of Blockchain and DLT Sys

Decentralized Web Node
A spedification to define a data storage and message relay mechanism that entities can use to locate public or private permissioned data related to a given Decentralized Identifier (DID).

Degrees of protection provided byenclosures (IP Code) (IEC 60529:1989(EQV))
This standard applies to the classification of degrees of protection provided by enclosures forelectrical equipment with a rated voltage not exceeding 72,5 kV.
Designing for Safety and Lean Manufacturing: A guide on integrating safety and lean manufacturing principles in the use of machinery
This document provides guidance on the practical application of safety and lean manufacturing principles to machinery and manufacturing systems for improving performance, safety and quality by reducin
Development and Trustworthiness of autonomous / cognitive Systems - Part 1: Terms and concept
VDE-AR-E 2842-61-1 specifies a general framework for the development of trustworthy solutions and trustworthy autonomous / cognitive systems, including the requirements for the subsequent phases of Pr
Development and Trustworthiness of autonomous / cognitive Systems - Part 2: Management
VDE-AR-E 2842-61-2 describes the requirements for the management in order to ensure and support a structured approach to the development of an trustworthy autonomous cognitive system.
Development and Trustworthiness of autonomous / cognitive Systems - Part 3: Development at Solution Level (whole application)
VDE-AR-E 2842-61-3 describes the requirements for the management in order to ensure and support a structured approach to the development of an trustworthy autonomous cognitive system.
Development and Trustworthiness of autonomous / cognitive Systems - Part 6: After Release of the Solution
VDE-AR-E 2842-61-6 specifies a general framework for the development of trustworthy solutions and trustworthy autonomous / cognitive systems, including the requirements for the subsequent phases of Pr
Device and Sensors Working Group
The mission of the Device and Sensors Working Group is to create client-side APIs that enable the development of Web Applications that interact with device hardware, sensors, services and applicati

DevSecOps
Businesses are now requiring a stronger collaboration between the development, security and operational functions. This addition of security creates DevSecOps.

Diagnostic and Maintenance Control
This subcommittee of SCC20 is responsible for the Artificial Intelligence Exchange and Service Tie to All Test Environments (AI-ESTATE) standard, the Testability and Diagnosability Characteristics

DIDComm Messaging v2.0
A protocol to exchange credentials between two identity wallets.

Digital Enhanced Cordless Telecommunications (DECT); Study on URLLC use cases of vertical industries for DECT evolution and DECT-2020
Presents a study of use cases and vertical scenarios for Ultra-Reliable Low-Latency Communications (URLLC) intended to be used as base requirements for evolving DECT.
Digital Nameplate - Digital Product Marking
IEC 63365:2022 applies to products used in the process measurement, control and automation industry.

Digital Radio Mondiale (DRM);System Specification
The frequency bands used for broadcasting below 30 MHz are: •Low Frequency (LF) band: from 148,5 kHz to 283,5 kHz, in ITU Region 1 [1] only; •Medium Frequency (MF)

Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized.

Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized.

Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery.

Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery.

Digital signatures with appendix -- Part 1: General
ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages of arbitrary length.

Digital signatures with appendix -- Part 1: General
ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages of arbitrary length.

Digital signatures with appendix -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:

Digital signatures with appendix -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:

Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides

Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides

Digital twin - Concepts and terminology
This document establishes terminology for Digital Twin (DT) and describes concepts in the field of Digital Twin, including the terms and definitions of Digital Twin, concepts of Digital Twin (e.g., Di
Digital Twin - Correspondence measure of DTw twinning
Definition of DTw correspondence measure; Components of the measure such as similarity, resolution, latency, LoD (level of detail); Quantification of the measure, Relation with other DTw projects incl
Digital Twin - Extraction and transactions of data components
This document specifies technical aspects related to the extraction, decoupling, trading, and benefits of data components throughout the digital twin life cycle.
Digital twin - Maturity model and guidance for a maturity assessment
This document provides a generic digital twin maturity model, definition of assessment indicators, and guidance for a maturity assessment.
Digital Twin - Reference architecture
This document specifies a general Digital Twin Reference Architecture in terms of defining system characteristics, a Reference Model and architecture views for Digital Twins.
Digital Twin - Use cases
This document provides a collection of representative use cases of DT applications in a variety of domains.
Digital twin — Concepts and terminology
This document establishes terminology for digital twin (DTw) and describes concepts in the field of digital twin, including the terms and definitions of digital twin, concepts of digital twin (e.g.

Digital Video Broadcasting (DVB); Metadata generation and deterministic DVB-T-mega-frame/DVB-T2-MI stream generation from MPEG-2 Transport Stream(s) for a DVB Single Illumination System
The present document describes the Single Illumination System, which allows to deliver Parent Signals for direct reception by consumer receivers and, at the same time, for a deterministic generatio

Digitally Recorded Media for Information Interchange and Storage
Standardization in the field of removable digital storage media utilizing optical, holographic and magnetic recording technologies, and flash memory technologies for digital information interchange

Digitally Recorded Media for Information Interchange and Storage
Standardization in the field of removable digital storage media utilizing optical, holographic and magnetic recording technologies, and flash memory technologies for digital information interchange

Distributed Resource Management Application API Version 2.2 (DRMAA)
This document describes the Distributed Resource Management Application API Version 2 (DRMAA).

Distributed Resource Management Application API Version 2.2 (DRMAA) C Language Binding.
This document describes the C language binding for the Distributed Resource Management Application API Version 2 (DRMAA). The intended audience for this specification are DRMAA implementors.

Distributed Resource Management Application API Working Group (DRMAA-WG)
The 'Distributed Resource Management Application API (DRMAA)' working group develops and maintains a set of API specifications for tightly coupled and portable programmatic access to cluster, grid,

Distributed Tracing Working Group
The mission of the Distributed Tracing is to define standards for interoperability between tracing tools.

DNS PRIVate Exchange
The initial focus of this Working Group was the development of mechanisms that provide confidentiality and authentication between DNS Clients and Iterative Resolvers (published as RFCs 7858 and 809

Document description and processing languages
Standardization in the field of document structures, languages and related facilities for the description and processing of compound and hypermedia documents, including:

Document description and processing languages
Standardization in the field of document structures, languages and related facilities for the description and processing of compound and hypermedia documents, including:

Document management - 3D use of Product Representation Compact (PRC) format - Part 1: PRC 10001
ISO 14739-1:2014 describes PRC 10001 of a product representation compact (PRC) file format for three dimensional (3D) content data.
Document management - Portable document format - Part 1: PDF 1.7
ISO 32000-1:2008 specifies a digital form for representing electronic documents to enable users to exchange and view electronic documents independent of the environment in which they were created or t
Document management - Portable document format - Part 2: PDF 2.0
This document specifies a digital form for representing electronic documents to enable users to exchange and view electronic documents independent of the environment in which they were created or the
Document management - Portable document format - RichMedia annotations conforming to the ISO 10303-242 (STEP AP 242) specification
This document specifies how to extend the ISO 32000-2 specification by adding the ISO 10303-242 (STEP AP 242) format as a valid format for 3D assets contained in a RichMedia annotation.
Document management - XML Forms Data Format - Part 1: Use of ISO 32000-2 (XFDF 3.0)
This document specifies an XML format for representing forms data and annotations in the Portable Document Format, ISO 32000-2 (PDF 2.0).
DOI: 10.1109/TPSISA52974.2021.00032. The Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications
The metaverse promises a host of bright opportunities for business, economics, and society.
Domain ontology for technical communication
iiRDS is a standard for the delivery of intelligent information in the scope of user assistance for products.

Draft Standard for Application Interface Specification for Blockchain Systems
This standard is IEEE Standard for Application Interface Specification for Blockchain Systems.
Draft Standard for Augmented Reality on Mobile Devices: General Requirements for Software Framework, Components, and Integration
This standard specifies the general technical framework, components, integration, and main business processes of augmented reality systems applied to mobile devices, and defines its technical requirem
Draft Standard for Blockchain Identity Key Management
The current blockchain has problems such as a wide variety of chains, independent design rules for each identity account, and different cryptographic curve signature algorithms.
Draft Standard for Blockchain Interoperability - Cross Chain Transaction Consistency Protocol
The technical architecture and details of three cross-chain approaches is described in this standard, including Centralized/Multi-signature Notary-based cross-chain technology, HTLC-based cross chain
Draft Standard for Blockchain Interoperability Naming Protocol
This standard defines a set of protocols that enable Blockchain networks to locate each other's trusted nodes through standardized names.
Draft Standard for Blockchain-based Digital Asset Classification
Blockchain-based digital assets exist in a specific system in the form of digitization.
Draft Standard for Blockchain-based Zero-Trust Framework for Internet of Things (IoT)
The surging needs for the Internet of Things (IoT) are dramatically shifting the network structure and challenging the traditional perimeter security paradigm.
Draft Standard for Framework and Definitions for Blockchain Governance
This standard provides a common nomenclature and framework for describing blockchain governance across all use cases and contexts, including public, private, permissioned, permissionless, and hybrid.
Draft Standard for General Requirements for Identity Framework for Metaverse
This standard defines the requirements of an identity framework for metaverse. This standard provides an identity framework for use across different metaverse systems.
Draft Standard for Tactile Internet: Application Scenarios, Definitions and Terminology, Architecture, Functions, and Technical Assumptions
This standard defines a framework for the Tactile Internet, including descriptions of various application scenarios, definitions and terminology, functions, and technical assumptions.
draft-contreras-alto-service-edge-04 Use of ALTO for Determining Service Edge
Service providers are starting to deploy and interconnect computing capabilities across the network for hosting network functions and applications.

draft-contreras-alto-service-edgeUse of ALTO for Determining Service Edge
This document proposes an initial approach towards the use of ALTO to provide such information and assist the selection of appropriate deployment locations for services and applications.

draft-dwon-t2trg-multiedge-archMulti-cluster Edge System Architecture and Network Function Requirements
In this draft, it is presented the cluster-based edge system architecture and multi-cluster edge network topology that consists of multi-cluster edge system and core cloud.

draft-ietf-mops-ar-use-case-04Media Operations Use Case for an Augmented Reality Application on Edge Computing Infrastructure
This document explores the issues involved in the use of Edge Computing resources to operationalize media use cases that involve Extended Reality (XR) applications.

draft-ietf-mops-ar-use-caseMedia Operations Use Case for an Augmented Reality Application on Edge Computing Infrastructure
A use case describing transmission of an application on the Internet that has several unique characteristics of Augmented Reality (AR) applications is presented for the consideration of the Media

draft-irtf-coinrg-use-cases Use Cases for In-Network Computing
This document discusses some use cases to demonstrate how real
applications can benefit from COIN and to showcase essential requirements that have to be fulfilled by COIN applications.

draft-irtf-t2trg-iot-edgeIoT Edge Challenges and Functions
This document outlines the requirements of the emerging IoT Edge and its challenges.

draft-mcbride-edge-data-discovery-overviewEdge Data Discovery for COIN
This document describes the problem of distributed data discovery in edge computing, and in particular for computing-in-the-network (COIN), which may require both the marshalling of data at the out

DSP0800
This specification contains the requirements for an implementation of the SM CLP

Dynamic Host Configuration
The Dynamic Host Configuration Working Group (DHC WG) has developed DHCP for automated allocation, configuration and management of IP addresses, IPv6 prefixes, IP protocol stack and other parameter

Dynamic Host Configuration
The Dynamic Host Configuration Working Group (DHC WG) has developed DHCP for automated allocation, configuration and management of IP addresses, IPv6 prefixes, IP protocol stack and other parameter

DySPAN-SC (IEEE P1900)
The IEEE P1900 Standards Committee, DySPAN-SC's predecessor, was established in the first quarter 2005 jointly by the IEEE Communications Society (ComSoc) and the IEEE Electromagnetic Compatibility

E-cert BRS
This document describes the extent and limits of the business process within the information chain.

EEA Crosschain Security Guidelines Version 1.0
Security considerations for transactions conducted across more than one blockchain

Electromagnetic compatibility (EMC) - Part 6-2: Generic standards - Immunity standard for industrial environments (IEC 61000-6-2:2016)
This part of IEC 61000 for EMC immunity requirements applies to electrical and electronic equipment intended for use in industrial locations, as described below.
Electromagnetic compatibility and Radio spectrum Matters (ERM); System Reference document (SRdoc): Spectrum Requirements for Short Range Device, Metropolitan Mesh Machine Networks (M3N) and Smart Metering (SM) applications
System Reference document to describe expected functionalities, benefits and service & facilities (including brief Layer 1, Layer 2, Layer3) for Metropolitan Mesh Machine Network (M3N) and Smar

Electromagnetic compatibility and Radio spectrum Matters (ERM); System Reference Document; Short Range Devices; Part 2: Technical characteristics for SRD equipment for wireless industrial applications using technologies different from Ultra-Wide Band
Gives perspectives on wireless network of data acquisition terminals, robotic type equipment or automated guided vehicles, and Robotic arms
Electronic Data Exchange Proxy
This document describes the extent and limits of the business process within the information chain being described in this document.

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4) - Part 1: Syntax rules common to all parts
This part of ISO 9735 specifies common syntax rules for the formatting of batch and interactive messages to be interchanged between computer application systems.

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 2: Syntax rules specific to batch EDI
This part of ISO 9735 specifies syntax rules specifically for the formatting of batch messages to be interchanged between computer application systems.

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 3: Syntax rules specific to interactive EDI
This part of ISO 9735 specifies syntax rules specifically for the transfer of interactive messages to be interchanged between computer application systems.

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 4: Syntax and service report message for batch EDI (message type - CONTRL)
This part of ISO 9735 defines the syntax and service report message for batch EDI, CONTRL.

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 5: Security rules for batch EDI
This part of ISO 9735 specifies syntax rules for EDIFACT security.

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 6: Secure authentication and acknowledgement message (Message type: AUTACK)
This part of ISO 9735 for EDIFACT security defines the secure authentication and acknowledgement message AUTACK.

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 7: Security rules for batch EDI (confidentiality)
This part of ISO 9735 for batch EDIFACT security addresses message/package level, group level and interchange level security for confidentiality in accordance with established security mechanisms.<

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 8: Associated data in EDI
This part of ISO 9735 specifies syntax rules for associated data in EDI to be interchanged between computer application systems.

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 9: Security key and certificate management message (message type: KEYMAN)
This part of ISO 9735 for batch EDIFACT security defines the security key and certificate management message KEYMAN.

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 2) - Part 10: Syntax service directories
ISO 9735-10:2014 specifies the syntax service directories of all parts of ISO 9735.

Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules
Scope of part 1: This part of ISO 9735 specifies common syntax rules for the formatting of batch and interactive messages to be interchanged between computer application systems.

Electronic fee collection — Compliance check communication for autonomous systems
This document defines requirements for short-range communication for the purposes of compliance checking in autonomous electronic fee collecting systems.

Electronic fee collection — Evaluation of on-board and roadside equipment for conformity to ISO 12813
ISO 13143-2:2016 specifies the abstract test suite (ATS) to evaluate the conformity of on-board equipment (OBE) and roadside equipment (RSE) to ISO 12813 in accordance with the test suite structure

Electronic fee collection — Evaluation of on-board and roadside equipment for conformity to ISO 12813
ISO 18143-1:2016 specifies the test suite structure (TSS) and test purposes (TP) to evaluate the conformity of on-board units (OBU) and roadside equipment (RSE) to ISO 12813:2015.

Electronic fee collection — Evaluation of on-board and roadside equipment for conformity to ISO 13141
ISO 13140-2:2016 specifies the abstract test suite (ATS) to evaluate the conformity of on-board equipment (OBE) and roadside equipment (RSE) to ISO 13141:2015 in accordance with the test suite stru

Electronic fee collection — Evaluation of on-board and roadside equipment for conformity to ISO 13141
ISO 13140-1:2016 specifies the test suite structure (TSS) and test purposes (TP) to evaluate the conformity of on-board units (OBU) and roadside equipment (RSE) to ISO 13141.

Electronic fee collection — Localisation augmentation communication for autonomous systems
ISO 13141:2015 establishes requirements for short-range communication for the purposes of augmenting the localization in autonomous electronic fee collection (EFC) systems.

Electronic Identity Credential Trust Elevation Framework Version 1.0
The OASIS Trust Elevation TC works to define a set of standardized protocols that service providers may use to elevate the trust in an electronic identity credential presented to them for authentic

Electronic invoicing – Part 1 Semantic model of core elements, Part 2-3 UBL profile, Part 3-3 CII profile
Semantic data model for electronic invoices, with profiles for the two major EU invoice specifications (see UBL and CII below).

Electronic Storage Specifications for use of Visible Digital Seal (VDS) for the authentication, verification and acquisition of data carried by a document or object
This document specifies the Visible Digital Seal (VDS) data structure.
Emergency Communications (EMTEL); Core elements for network independent access to emergency services
The core elements for network independent access to emergency services provide facilities that support centralized mapping and routing fun

Emergency Communications (EMTEL); Guidelines for alert message content accessibility
Alert messages need to be presented to users affected by possible alerts in a way that they can be readily understood and required actions can be taken.

Emergency Communications (EMTEL); Pan-European Mobile Emergency Application
The Pan-European Mobile Emergency Application (PEMEA) architecture provides the requirements and architecture for a solution to provide emergency application interconnect

Emergency Communications (EMTEL); Requirements for communications from authorities/organizations to individuals, groups or the general public during emergencies; authorities to citizens
The document gives an overview of the requirements for communication from authorities/organizations to citizens in all types of emergencies.

Emergency Communications (EMTEL); Total Conversation Access to Emergency Services
Total Conversation, as defined in ITU-T F.703, is a combination of three media in a conversational call: video, real-time text and audio.

Emergency Communications (EMTEL); Transporting Handset Location to PSAPs for Emergency Calls - Advanced Mobile Location
One of the biggest challenges facing the Emergency Services is determining the location of mobile callers.

Emergency Communications (EMTEL);Lightweight Messaging Protocol for Emergency Service Accessibility (LMPE)
Lightweight Messaging Protocol for Emergency Service accessibility (LMPE) extends a SIP SIMPLE based messaging service with session mode and facilities to redirect or tra

Emergency Communications (EMTEL);Requirements for communication between authorities/organizations during emergencies
The present document addresses the requirements for communications between the authorized representatives who can be involved in the responses and actions when handling a

Emergency Communications (EMTEL);Requirements for communications from authorities/organizations to individuals, groups or the general public during emergencies
Recent world events have created a heightened social focus on public protection and general public safety.

EMTEL; Study of use cases and communications involving IoT devices in provision of emergency situations
The purpose of this work item is to prepare the requirements for communications involving IoT devices in all types of emergency situations (e.g.

EN ISO 29481-2:2016 Building information models - Information delivery manual - Part 2: Interaction framework (ISO 29481-2:2012)
ISO 29481-2:2012 specifies a methodology and format for describing coordination acts' between actors in a building construction project during all life cycle stages.

Enabling 5G Autonomous Robots in the Factory
Webinar Addresses: Connected, smarter robots are considered crucial to delivering efficiencies through automation and remote monitoring, in areas such as factory floors.
Encoding and resolving identifiers over HTTP
This standard defines an approach for using HTTP URIs as identifiers in AIDC systems and a basic common API for querying online services for information about identified items.

Encrypted Data Vaults v0.1
This specification describes a privacy-respecting mechanism for storing, indexing, and retrieving encrypted data at a storage provider.

Encryption algorithms -- Part 1: General
This part of ISO/IEC 18033 is general in nature, and provides definitions that apply in subsequent parts of this International Standard.

Encryption algorithms -- Part 1: General
This part of ISO/IEC 18033 is general in nature, and provides definitions that apply in subsequent parts of this International Standard.

Encryption algorithms -- Part 2: Asymmetric ciphers
ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality.

Encryption algorithms -- Part 2: Asymmetric ciphers
ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality.

Encryption algorithms -- Part 3: Block ciphers
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k bits.

Encryption algorithms -- Part 3: Block ciphers
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k bits.

Encryption algorithms -- Part 4: Stream ciphers
This part of ISO/IEC 18033 specifies
a) output functions to combine a keystream with plaintext,
b) keystream generators for producing keystream, and

Encryption algorithms -- Part 4: Stream ciphers
This part of ISO/IEC 18033 specifies
a) output functions to combine a keystream with plaintext,
b) keystream generators for producing keystream, and

Encryption algorithms -- Part 5: Identity-based ciphers
This part of ISO/IEC 18033 specifies identity-based encryption mechanisms.

Encryption algorithms -- Part 5: Identity-based ciphers
This part of ISO/IEC 18033 specifies identity-based encryption mechanisms.

Encryption algorithms -- Part 6: Homomorphic encryption
This document specifies the following mechanisms for homomorphic encryption.
— Exponential ElGamal encryption;
— Paillier encryption.

Encryption algorithms -- Part 6: Homomorphic encryption
This document specifies the following mechanisms for homomorphic encryption.
— Exponential ElGamal encryption;
— Paillier encryption.

End-to-end cloud service lifecycle management requirements
This Recommendation specifies the functional requirements of end-to-end (E2E) cloud service lifecycle management. This Recommendation comprises the following:

End-to-end cloud service lifecycle management requirements
Recommendation ITU-T Y.3522 provides an overview of end-to-end (E2E) cloud service lifecycle management by specifying cloud service lifecycle metadata, the cloud service lifecycle management framew