Standard

Available (2726)

Showing 2293 - 2304 per page



Information technology -- Cloud service metering and billing elements

As the adoption of cloud computing expands and the market grows, cloud service providers (CSPs) offer many different solutions of cloud services that can be classified as infrastructure, platform and application capabilities. Inevitably, CSPs, in designing solutions to meet the functionalities of cloud service customers (CSCs), put together diverse metering elements and billing modes that complement the cloud services offered to cloud service customers (CSCs).  It is challenging for CSCs to determine the differences of many diverse metering elements and billing modes from various CSPs as they navigate their journey to adopt cloud computing.
Measured service is one of the key characteristics of cloud computing (ISO/IEC 17788).  The feature is that a CSC may only be charged for the resources used.  To this end, it is necessary that usage can be monitored, controlled, reported, and billed for delivered cloud service.  Metering elements can be given and classified according to its cloud capabilities type.  Reasonable and scientific metering and billing results can be easily achieved if common operation practices apply.
The purpose of this TR is to provide basic clarity and guidance through a sample set of cloud service metering elements and billing elements for different cloud service capability types, including a discussion on billing function component and metering which is one of four main parts of billing function component. Such a sample set of metering and billing elements can help CSP better describe its billing and metering exercise, and can help CSC better understand the situation in order to make informed decisions.
The scope of this document is to describes a sample set of cloud service metering and billing elements.
 
Under development

ISO/IEC PDTR 23613

Information technology -- Cloud computing and distributed platforms -- Data sharing agreement (DSA) framework

This document establishes a set of building blocks (concepts, terms and definitions, including Data Level Objectives and Data Qualitative Objectives) that can be used to create Data Sharing Agreements  (DSAs). This document is applicable to DSAs where the data is intended to be processed using one or more cloud services or other distributed platforms.
 
Under development

ISO/IEC AWI 23751

Cloud computing -- Best practices for cloud SLA metrics

In most cases, cloud service providers (CSPs) and cloud service customers (CSCs) negotiate service level agreements (SLAs) which include service level objectives (SLOs) and service qualitative objectives (SQOs) for which CSPs make commitments.. The commitments described in SLAs must be measured against actual performance of the service to ensure compliance with the SLA. How actual performance compares against commitments in SLAs, is explained in ISO/IEC 19086-2:2018[2] Metric model.  Cloud SLAs are covered in ISO/IEC 19086-1:2016[1] Service level agreement (SLA) framework Part 1:  Overview and concepts and in ISO/IEC 19086-4:2019[3] Security and privacy.
ISO/IEC 19086-2 Metric model establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.  This document provides a primer on using the metrics model in 19086-2 to compose the calculation of a cloud service performance measure in order to compare against an SLA commitment. A few examples from the SLOs listed in ISO/IEC 19086-1 (Clause 10) are given in the document, such as Cloud Service Response Time Mean and Cloud Service Availability. As specific, measurable characteristics of a cloud service, SLOs are the basis for defining the metrics used to evaluate and compare agreements between parties.
In the second half of the document, a basic dissection of these examples is provided using a practical method based on a tabular format. This  format allows for a consistent usage of the model across practitioners such as:
- Extracting metric material from an SLA narrative and representing this content separately and unambiguously.
- Designing and representing a new metric definition.
Along with demonstrating this method on previous examples, some best practices are collected and reported.  These best practices also provide practical guidance on how to extend or complement the model when necessary, which is allowed by the 19086-2 Metric model standard but beyond its scope and non-normative.
The scope of this technical report is to describe a practical method for using ISO/IEC 19086-2 Metric Model.
 
Under development

ISO/IEC NP TR 23951

Security requirements for cryptographic modules

ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g. a guarded facility, an office, removable media, and a completely unprotected location).

ISO/IEC 19790:2012

Security assessment of operational systems

This Technical Report provides guidance and criteria for the security evaluation of operational systems. It provides an extension to the scope of ISO/IEC 15408, by taking into account a number of critical aspects of operational systems not addressed in ISO/IEC 15408 evaluation. The principal extensions that are required address evaluation of the operational environment surrounding the target of evaluation, and the decomposition of complex operational systems into security domains that can be separately evaluated.

ISO/IEC TR 19791:2010

Security evaluation of biometrics

This International Standard specifies the subjects to be addressed during a security evaluation of a biometric system.
It covers the biometric-specific aspects and principles to be considered during the security evaluation of a biometric system. It does not address the non-biometric aspects which might form part of the overall security evaluation of a system using biometric technology (e.g. requirements on databases or communication channels).

ISO/IEC 19792:2009

Maritime Broadband Radiolink operating within the bands 5 852 MHz to 5 872 MHz and/or 5 880 MHz to 5 900 MHz for ships and off-shore installations engaged in coordinated activities; Harmonised Standard covering the essential requirements of article 3.2 of

The present document specifies technical characteristics and methods of measurements for maritime mobile broadband radiocommunication systems (MBR) radio equipment intended to operate in the 5,8 GHz band.

The present document applies to systems utilizing integral electronically phase steered antennae applicable for communications between vessels and between vessels and platforms engaged in coordinated off-shore activities.

ETSI EN 303 276 V1.1.1

SmartM2M; Smart Appliances Ontology and Communication Framework Testing; Part 1: Testing methodology

The scope of the present document is to support Smart Appliance common ontology and communication framework testing needs. It specifies a global methodology for testing for Smart Appliances, based oneM2M specifications. It analyses the overall testing needs and identifies and defines the additional documentation required.

The testing framework proposed in the present document provides methodology for development of conformance and interoperability test strategies, test systems and the resulting test specifications for SAP.

ETSI TS 103 268-1 V1.1.1