Standard

Available (2726)

Showing 2341 - 2352 per page



Study of Authorization Architecture for Supporting Heterogeneous Access Control Policies

The present document provides technical solutions for oneM2M authorization architecture, authorization procedures and access control policies. The present document also gives evaluations of these proposed technical solutions.

ETSI TS 118 103 [i.2] only defines a high level authorization architecture that describes its major components and general authorization procedure. The objective of the present document is to provide candidate security solutions related to authorization architecture, authorization procedures and access control policies. The present document provides security solutions in the following three aspects:

• Detailed design of authorization architecture: This part investigates the interfaces among authorization components (e.g. procedures and parameters), how these components could be distributed in different oneM2M entities (i.e. different CSEs), and how to implement Role Based Access Control (RBAC) and token based access control.

• Supporting user specified access control policies: This part investigates how the oneM2M authorization system could be an extensible system that can support user-defined access control mechanisms and/or access control policy languages.

• Investigating existing access control policy languages: This part investigates if some standardized access control policy languages could become oneM2M recommended access control policy description languages

ETSI TR 118 516 V2.0.0

End-to-End Security and Group Authentication

The present document provides options and analyses for the security features and mechanisms providing end-to-end security and group authentication for oneM2M.

The scope of this technical report includes use cases, threat analyses, high level architecture, generic requirements, available options, evaluation of options, and detailed procedures for executing end-to-end security and group authentication.

ETSI TR 118 512 V2.0.0

Study of Management Capability Enablement Technologies for Consideration

The present document describes and collects the state-of-art of the existing technologies on management capability, evaluates if the technologies can match the requirements defined in oneM2M, analyzes how the technologies can leverage the design of the architecture of oneM2M.

ETSI TR 118 506 V1.0.0

Architecture Part 2: Study for the merging of architectures proposed for consideration

The present document provides an evaluation of existing M2M-related Architecture work undertaken by the founding partners of oneM2M, including: the Association of Radio Industries and Businesses (ARIB) and the Telecommunication Technology Committee (TTC) of Japan; the Alliance for Telecommunications Industry Solutions (ATIS) and the Telecommunications Industry Association (TIA) of the USA; the China Communications Standards Association (CCSA); the European Telecommunications Standards Institute (ETSI); and the Telecommunications Technology Association (TTA) of Korea. Common Functional Entities and Reference Points are identified, as well as critical differences. New functionality will not be considered as part of this study.

The present document is intended to ensure a common understanding of existing M2M Architectural approaches, in order to facilitate future normative work resulting in oneM2M Technical Specifications. The present document has been prepared under the auspices of the oneM2M Technical Plenary, by the oneM2M Architecture Working Group.

ETSI TR 118 503 V1.0.0

Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms

This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized. The security of all three schemes is based on the difficulty of factorizing large numbers. All three schemes can provide either total or partial message recovery.

ISO/IEC 9796-2:2010

Check character systems

This International Standard specifies a set of check character systems capable of protecting strings against errors which occur when people copy or type data. This International Standard specifies conformance requirements for products described as generating check characters or checking strings using the systems given in this International Standard.

ISO/IEC 7064:2003

For Motion-Picture Film (35-mm) — Camera Aperture Images and Usage

 This standard specifies the dimensions of the camera aperture images and the relative positions of the vertical and horizontal centerlines of the intended image area with respect to the reference edge and the perforations of the camera negative film for 35-mm motion-picture cameras.

SMPTE ST 59:1998

Next Generation Protocols (NGP)

The scope of the Standard is to specify the minimum set of key requirements for the Next Generation Protocols (NGP), Industry Specific Group (ISG). The present document addresses requirements in the following areas:

• Business Case and Techno-Economics
• Migration
• General Technical Requirements
• Addressing
• Security
• Mobility
• Multi-Access Support (including FMC)
• Context Awareness
• Performance (including Content Enablement)
• Network Virtualisation
• IoT Support
• Energy Efficiency
• e-Commerce
• MEC
• Mission Critical Services
• Drones and Autonomous Vehicles and Connected Vehicles
• Ultra Reliable Low Latency Communications

ETSI GS NGP 005 V1.1.1

Evolved Architecture for mobility using Identity Oriented Networks

The present document provides an overview of existing identity oriented protocols, mapping systems and proposes next generation mobility with a generic and resilient identity services infrastructure.

ETSI GR NGP 004 V1.1.1