Standard

Available (2726)

Showing 1537 - 1548 per page



User Group; Collection of user requirements from visually impaired people for e-accessibility to ICT products and services

Identification of use cases for visually impaired people for e-access to ICT products and services but also use cases to allow users to interact with machines or equipment (e.g. users terminal, user interface) via dedicated devices (M2M communications) in order to define appropriate protocols (NFC or similar)
The intention is not to define technical solutions but to forward the requirements to the appropriate TBs

ETSI TR 103 185 V1.1.1 (2015-08)

IEEE P1711 - Standard for a Cryptographic Protocol for Electric Power System (EPS) Communications Links

This standard defines a suite of cryptographic protocols supporting the protection of Electric Power System communications links. It does not address specific applications or hardware implementations, and is independent of the underlying communications protocol.

IEEE P1711

IEEE P1402 - IEEE Draft Guide for Physical Security of Electric Power Substations

This guide describes recommended practices for the physical security of electric power substations. It is designed to address a number of threats, including unauthorized access to substation facilities, theft of material, and vandalism. It describes options for positive access control, monitoring of facilities, and delay/deter features which could be employed to mitigate these threats. This guide also establishes options for different levels of physical security for electric power substations. The guide does not establish recommendations based on voltage levels, size or any depiction of criticality of the substation. The user will make these decisions based on threat assessment and criticality assignment by the substation owner. Overt attacks against the substation for the purpose of destroying its capability to operate, such as explosives, projectiles, vehicles, etc. are beyond the scope of this guide.

IEEE P1402

Requirements and capability framework for IoT-based automotive emergency
response system

The objective of Recommendation ITU-T Y.4119 is to identify requirements of an Internet of things (IoT)-based automotive emergency response system (AERS) for aftermarket devices and to provide a capability framework of the AERS.In particular, the scope of this Recommendation includes:– Overview of the AERS– Requirements of the AERS– Capability framework of the AERSAERS for original equipment manufacturer (OEM) pre-installed devices, such as the pan-European eCall [b-CEN EN 16072], is out of scope of this Recommendation.NOTE – AERS can be considered as a third party service provider (TPSP) system [b-CEN EN 16102] in the pan-European eCall.Also, the operation of the emergency authority (EA) is out of scope of this Recommendation.

Y.4119

Y.4456 - Requirements and functional architecture for smart parking lots in smart cities

Smart parking lots (SPLs) integrate parking information to enable the coordination of parking facilities within smart cities. SPLs work with other systems to provide various parking services. This Recommendation specifies the requirements and functional architecture for SPLs. The scope of this Recommendation includes: introduction of SPLs; requirements for SPL; Functional architecture of SPL. For use cases of SPL see Appendix I. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation.

Y.4456

Y.4457 - Architectural framework for transportation safety services

This Recommendation addresses a transportation safety management model that describes disaster management steps based on Internet of things (IoT) technologies in order to reduce damage from disasters. An architectural model for transportation safety services is described based on [ITU-T Y.4116] and on requirements according to the IoT reference model [ITU-T Y.4000].
The scope and characteristics of transportation disasters from various transportations (e.g., road, railway, maritime and air transportation) are based on [ITU-T Y.4116]. Transportation safety management parameters (e.g., safety index and driver tiredness) are presented respectively in Annex A and Annex B and sensing data pre-processing procedure and characteristics of transportation application services are described in the appendices of this Recommendation.
NOTE – In this Recommendation, some capabilities (e.g., driver condition monitoring, infrastructure monitoring) and some applications (e.g., road/train/maritime/air safety management services) may be related to regulation in some countries. In this case, non-functional aspects related to regulation are out of scope and functional aspects cannot supersede existing regulation. Regulatory issues may be subject to laws (e.g., intelligent transportation system (ITS) related regulation).

Y.4457

IEEE 1619.1-2018 - IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

Cryptographic and data authentication procedures for storage devices that support length expansion, such as tape drives, are specified. Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.

IEEE 1619.1-2018

IEEE 1619.2-2021 - IEEE Approved Draft Standard for Wide-Block Encryption for Shared Storage Media

EME2-AES and XCB-AES wide-block encryption with associated data (EAD) modes of the NIST AES block cipher, providing usage guidelines and test vectors, are described. A wide block encryption algorithm behaves as a single block cipher with a large plaintext input and ciphertext output, but uses a narrow block cipher [in this case Advanced Encryption Standard (AES)] internally. These encryption modes are oriented toward random access storage devices that do not provide authentication, but need to reduce the granularity of a potential attack.

IEEE 1619.2-2021

IEEE 1667-2018 - IEEE Standard for Discovery, Authentication, and Authorization in Host Attachments of Storage Devices

Discovery, authentication, and authorization protocols between hosts and storage devices over multiple transports are defined in this standard.

IEEE 1667-2018

IEEE 1686-2013 - IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities

The functions and features to be provided in intelligent electronic devices (IEDs) to accommodate critical infrastructure protection programs are defined in this standard. Security regarding the access, operation, configuration, firmware revision and data retrieval from an IED are addressed. Communications for the purpose of power system protection (teleprotection) are not addressed in this standard.

IEEE 1686-2013

IEEE 1888.3-2013 - IEEE Standard for Ubiquitous Green Community Control Network: Security

The enhanced security management function for the protocol defined in IEEE 1888(TM), “Ubiquitous Green Community Control Network Protocol,” is described in this standard. Security requirements, system security architecture definitions, and a standardized description of authentication and authorization, along with security procedures and protocols, are specified. This standard can help avoid unintended data disclosure to the public and unauthorized access to resources, while providing enhanced integrity and confidentiality of transmitted data in the ubiquitous green community control network.

IEEE 1888.3-2013