Standard

Available (2726)

Showing 2257 - 2268 per page



IEEE - P7007 - Ontological Standard for Ethically Driven Robotics and Automation Systems

The standard establishes a set of ontologies with different abstraction levels that contain concepts, definitions and axioms which are necessary to establish ethically driven methodologies for the design of Robots and Automation Systems.
You can look here for a preview of the Standard Document

Development Status: Under development
 

IEEE - P7010 - Wellbeing Metrics Standard for Ethical Artificial Intelligence and Autonomous Systems

This standard establishes wellbeing metrics relating to human factors directly affected by intelligent and autonomous systems and establishes a baseline for the types of objective and subjective data these systems should analyse and include (in their programming and functioning) to proactively increase human wellbeing.
You can look here for a preview of the Standard Document

Development Status: Under development
 

ISO/IEC - JTC 1/SC 27 - 27005:2018

This document provides guidelines for information security risk management in an organization. However, this document does not provide any specific method for information security risk management. It is up to the organization to define their approach to risk management, depending for example on the scope of an information security management system (ISMS), context of risk management, or industry sector. A number of existing methodologies can be used under the framework described in this document to implement the requirements of an ISMS. This document is based on the asset, threat and vulnerability risk identification method that is no longer required by ISO/IEC 27001. There are some other approaches that can be used.

This document does not contain direct guidance on the implementation of the ISMS requirements given in ISO/IEC 27001.

This document is relevant to managers and staff concerned with information security risk management within an organization and, where appropriate, external parties supporting such activities.

SA1 SP-180922

This 3GPP SA1 Study Item (SID) for Release 17 focuses on updating and improving existing requirements for asset tracking, covering a larger variety of use cases. 

Its main goals are to:

  • Describing asset tracking use cases, e.g. pallets, containers, crates, parcels, luggage with an emphasis on those use cases bringing new potential requirements and new KPIs to be supported by 5G communication services.
  • Identifying new potential requirements to be fulfilled. 

Asset tracking encompasses distinct use cases such as pallets, trolleys, creates, containers, parcels and security asset tracking but also luggage, vehicles and even animals (pets/farm livestock) tracking.

Asset tracking is a huge market (billions of units) and mostly untapped by 3GPP technology. These assets are often not stationary: they are transported all over the world by different kinds of vehicles. Assets are also moved inside various types of buildings. Ownership may change many times during the lifecycle of the asset as different stakeholders take possession of the assets and pass them on to other stakeholders along the supply chain and value chain. 

The emergence of the sharing economy also implies that one asset can be used by different people, which further amplifies the need for asset tracking. Hence, many stakeholders want to track their assets anytime and anywhere (indoor and outdoor) in a global and multi-modal context (sea, air, road, rail). 

Gap filling and evolutions: 3GPP has already addressed asset tracking aspects:

  • In the context of Release 14: Feasibility Study on New Services and Market Technology Enablers (TR 22.891).
  • In the context of Release 16: Communication for Automation in vertical domains (TR 22.804).
  • In the context of Release 16: Feasibility Study on Business Role Models for Network Slicing. 

These requirements only cover a few asset tracking use cases. This new SA1 Study thus further investigates the asset tracking topic, with a view to identifying missing features and requirements for fulfilling as many asset tracking use cases as possible. 

  • The rapporteur is NOVAMINT. Supporting Individual Members (SIMs) include EU-based organisations such as Thales, TNO, KPN, b-com, Philips, Siemens and the European Space Agency (ESA) alongside global supply-side companies. 
     
3GPP New Study on Asset Tracking Use Cases

SA6 SP-181139

The overall focus of this 3GPP SA6 Study for Release 17 is investigating how 5G may significantly contribute to revolutionising how goods are produced, shipped and serviced throughout the entire lifecycle in the context of the "Fourth Industrial Revolution" or Industry 4.0. 

The main goals of this study item (SID) are:

  • Investigating and analysing general applicability of Factories of the Future related to cyber-physical control applications defined in 3GPP TS 22.261.
  • Developing key issues, corresponding architecture requirements to make the service enabler for “Factories of the Future” applications over 3GPP networks.
  • Providing customised solutions for Factory applications to cross-layer optimise and redesign the actual applications which are now based on the classical wired cable connection world.

Gap filing and evolutions:

  • This work builds on 3GPP Rel-16 work on cyber-physcial control applications in vertical domains (cyberCAV) as defined in TS 22.104 and TS 22.261. Requirements and studies on LAN support in 5G (5GLAN) are defined in TS 22.261.

The overarching goal of SP-181139 is to investigate what application layer support functions are required to efficiently use and deploy Factories of the Future in 5G networks. 

  • The rapporteur is ZTE Corporation. Supporting Individual Members (SIMs) include global supply side companies and Robert Bosch GmBH on the end-user side. 

 

3GPP Study on application layer support for Factories of the Future in 5G network

SA6 SP-181136

This 3GPP SA6 study item (SID) for Release 16 is aimed at identifying the impacts on and the necessary changes in Stage 2 (5G phase 2) for mission critical specifications to ensure support over 5G System (5GS). 

The main goals are: 

  • Identify subclauses in the existing stage 2 Mission Critical specifications that should also apply to the 5GS, but which currently contain 4G specific terminology and therefore would require terminology changes.
  • Develop a common approach (e.g. terminology) for changes in stage 2 Mission Critical specifications that apply to the 5GS.
  • Review and identify the 5GS aspects (e.g. 5QI, network slicing) to support Mission Critical architecture.
  • Identify key issues and develop solutions to ensure support of Mission Critical services over 5GS.
  • Evaluate the solutions and make recommendations for normative work.
  • Study where and how to integrate solutions in the stage 2 Mission Critical specifications.

Gap filling and evolutions: 3GPP has developed the 5G System (5GS) specifications from Release 15. Further work in Release 16 is based on input from 3GPP SA1, with TSG SA#78 confirming that the stage 1 Mission Critical (MC) specifications are applicable to LTE and beyond, including 5G (SP-170985). 

  • The rapporteur for this SID is The Police of the Netherlands. Supporting Individual Members (SIMs) include the UK Home Office, FirstNet (U.S.), the French Ministry of the Interior, associations such as the International Rail Union (UIC) and Public Safety Communications Europe (PSCE), as well as EU and global supply-side companies. 

 

 

3GPP Study on Mission Critical services support over 5G System   

Relationship with ISO 12100 — Part 4: Guidance to machinery manufacturers for consideration of related IT-security (cyber security) aspects.

This document gives machine manufacturers guidance on potential security aspects in relation to safety of machinery when putting a machine into service or placing on the market for the first time. It provides essential information to identify and address IT-security threats which can influence safety of machinery.

Source: https://www.iso.org/standard/73335.html

ISO/TR 22100-4:2018

ISO/IEC JTC 1/SC 27 9798-6:2010 - Entity authentication - Part 6: Mechanisms using manual data transfer

This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices. It indicates how these mechanisms can be used to support key management functions, and provides guidance on secure choices of parameters for the mechanisms.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:9798:-6:ed-2:v1:en

Information technology -- Cloud computing -- Service level agreement (SLA) framework -- Part 3: Core conformance requirements

ISO/IEC 19086-3 specifies the core conformance requirements for service level agreements (SLAs) for cloud services based on ISO/IEC 19086‑1 and guidance on the core conformance requirements. This document is for the benefit of and use by both cloud service providers and cloud service customers.
ISO/IEC 19086-3 does not provide a standard structure that would be used for cloud SLAs.
 
The standard can be bought here: https://www.iso.org/standard/67547.html
The informative sections of this standard are publicly available here: https://www.iso.org/obp/ui/#iso:std:iso-iec:19086:-3:ed-1:v1:en

ISO/IEC 19086-3:2017

Encryption algorithms -- Part 4: Stream ciphers

This part of ISO/IEC 18033 specifies
a) output functions to combine a keystream with plaintext,
b) keystream generators for producing keystream, and
c) object identifiers assigned to dedicated keystream generators in accordance with ISO/IEC 9834.

 

ISO/IEC 18033-4:2011

Encryption algorithms -- Part 5: Identity-based ciphers

This part of ISO/IEC 18033 specifies identity-based encryption mechanisms. For each mechanism the functional interface, the precise operation of the mechanism, and the ciphertext format are specified. However, conforming systems may use alternative formats for storing and transmitting ciphertexts.

ISO/IEC 18033-5:2015