Standard

Available (1835)

Showing 1717 - 1728 per page



Network Functions Virtualisation (NFV) Release 3; Management and Orchestration; Interface and Information Model Specification for Multi-Site Connectivity Services

The present document specifies the interfaces for management of multi-site connectivity services. The services are produced by a WAN Infrastructure Manager (WIM). The present document also describes the operations and the information elements that are exchanged over these interfaces.

ETSI GS NFV-IFA 032 V3.3.1

Network Functions Virtualisation (NFV) Release 2; Protocols and Data Models; NFV descriptors based on TOSCA specification

The present document specifies a data model for NFV descriptors, using the TOSCA Simple Profile in YAML, fulfilling the requirements specified in ETSI GS NFV-IFA 011 and ETSI GS NFV-IFA 014 for a Virtualised Network Function Descriptor (VNFD), a Network Service Descriptor (NSD) and a Physical Network Function Descriptor (PNFD). The present document also specifies requirements on the VNFM and NFVO specific to the handling of NFV descriptors based on the TOSCA Simple Profile in YAML specification.

ETSI GS NFV-SOL 001 V2.6.1

Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV

The present document provides terms and definitions for conceptual entities within the scope of the ISG NFV, in order to achieve a "common language" across all the ISG NFV working groups.

GS NFV 003 V1.4.1

Network Functions Virtualisation (NFV) Release 2; Protocols and Data Models; NFV Descriptors based on YANG Specification

The present document specifies the YANG models for representing Network Functions Virtualisation (NFV) descriptors, fulfilling the requirements specified in ETSI GS NFV-IFA 011 and ETSI GS NFV-IFA 014 applicable to a Virtualised Network Function Descriptor (VNFD), a Physical Network Functions Descriptor (PNFD) and a Network Service Descriptor (NSD).

ETSI GS NFV-SOL 006 V2.7.1

Network Technologies (NTECH); Autonomic network engineering for the self-managing Future Internet (AFI); Autonomicity and Self-Management in the Backhaul and Core network parts of the 3GPP Architecture

The document aims at providing recommendations for the introduction of autonomics (management and control intelligence) in the 3GPP Core and Backhaul network architectures. To this effect, it covers the instantiation of the reference model for Autonomic Networking, Cognition and Self-Management, called GANA (Generic Autonomic Networking Architecture), onto the architecture defined in ETSI TS 123 401 and ETSI TS 123 402. It superimposes GANA Decision Elements (DEs) into node/device architectures and the overall 3GPP network architecture, so that the DEs and their associated Control-Loops can be further designed to perform autonomic management and control of the specific resources (Managed Entities) in the target architecture. It develops recommendations on the basic behaviours of the GANA Functional Blocks (FBs) in the above context. 3GPP specifications on policy control (ETSI TS 123 203) and network management (TS 123 32x series) are taken into account into the working reference architecture. It also involves the backhaul network and associated interactions between the different entities for an optimization with an end-to-end perspective.

ETSI TR 103 404 V1.1.1

Cloud Control Matrix

The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. The CSA CCM provides a controls framework that gives detailed understanding of security concepts and principles that are aligned to the Cloud Security Alliance guidance in 13 domains. The foundations of the Cloud Security Alliance Controls Matrix rest on its customized relationship to other industry-accepted security standards, regulations, and controls frameworks such as the ISO 27001/27002, ISACA COBIT, PCI, NIST, Jericho Forum and NERC CIP and will augment or provide internal control direction for service organization control reports attestations provided by cloud providers.

CCM 3.0.1

Reference Architecture - Trusted Cloud Initiative

The Trusted Cloud Initiative helps cloud providers develop industry-recommended, secure and interoperable identity, access and compliance management configurations, and practices. The Trusted Cloud Initiative will develop reference models and education in a vendor-neutral manner, inclusive of all CSA members and affiliates who wish to participate. The Trusted Cloud Initiative Reference Architecture is both a methodology and a set of tools that enable security architects, enterprise architects and risk management professionals to leverage a common set of solutions that fulfill their common needs to be able to assess where their internal IT and their cloud providers are in terms of security capabilities and to plan a roadmap to meet the security needs of their business.

TCI