ETSI

Available (247)

Showing 25 - 36 per page



Measurement Ontology for IP traffic (MOI)

The present document identifies the requirements that should characterise an ontology for the semantic conceptualisation of information related to IP traffic measurements. The requirements are obtained through the analysis of use cases spanning across a variety of related application categories and domains of interest, as well as the consideration of additional qualitative needs, such as the protection of personal data. Additional inputs arise from user experience, as well as the 'GS/MOI-010' Work Item study, entitled "Report on information models for IP traffic measurement" . The general difficulty of setting limits to an ontology, taking concepts from outside is also dealt within the present document that states MOI focus on IP traffic measurement concepts and let's side ontologies dealing with other subjects, an easy way to link. Thus a rather practical approach to define MOI ontology will be laid so that further QoS, traffic monitoring and Internet governance issues can be built on top of it by means of semantic tools.

SAREF4AGRI: extension for the Smart Agriculture and Food Chain domains

The intention of SAREF4AGRI is to connect SAREF with existing ontologies and important standardization initiatives and ontologies in the Smart Agriculture and Food Chain domain, including ICAR for livestock data, AEF for agricultural equipment, Plant Ontology Consortium for plants, or AgGateway for IT support for arable farming.

ETSI GR QSC 004 V1.1.1

The present document presents the results of a simplified threat assessment following the guidelines of ETSI TS 102 165-1 [i.3] for a number of use cases. The method and key results of the analysis is described in clause 4. The present document makes a number of assumptions regarding the timescale for the deployment of viable quantum computers, however the overriding assertion is that quantum computing will become viable in due course. This is examined in more detail in clause 5. The impact of quantum computing attacks on the cryptographic deployments used in a number of existing industrial deployment scenarios are considered in clause 7.

GR QSC 004

ETSI GR QSC 003 V1.1.1

The present document examines a number of real-world uses cases for the deployment of quantum-safe cryptography (QSC). Specifically, it examines some typical applications where cryptographic primitives are deployed today and discusses some points for consideration by developers, highlighting features that may need change to accommodate quantum-safe cryptography. The main focus of the document is on options for upgrading public-key primitives for key establishment and authentication, although several alternative, non-public-key options are also discussed.

GR QSC 003

ETSI GR QSC 001 V1.1.1

The present document gives an overview of the current understanding and best practice in academia and industry about quantum-safe cryptography (QSC). It focuses on identifying and assessing cryptographic primitives that have been proposed for efficient key establishment and authentication applications, and which may be suitable for standardization by ETSI and subsequent use by industry to develop quantum-safe solutions for real-world applications.

GR QSC 001

ETSI GS QKD 010 V0.4.1 (Draft)

The present document specifies protection of QKD modules against Trojan horse attacks launched against a time-varying phase, polarisation or intensity modulator that encodes or decodes at least one of bit values, basis values or the intensities of signal, decoy or vacuum states from the quantum channel.

GS QKD 010

SmartM2M; Use cases for cross-domain data usability of IoT devices

Scope of document is to identify, select and describe use cases where the IoT data and services require data usability specifications for machines consuming data for AI (for example machine learning). Enabling data usability with AI approach will also be considered. It includes Use Cases pertianing to Robots

ETSI TR 103 778

5G; Service requirements for cyber-physical control applications in vertical domains

Provides Stage 1 normative service requirements for 5G systems, in particular service requirements for cyber-physical control applications in vertical domains. cyberphysical systems understood as systems that include engineered, interacting networks of physical and computational components; control applications are to be understood as applications that control physical processes. The requirements of relevance to robotics, e.g. Mobile Robots are discussed, including impact to Factories of the Future

ETSI TS 122 104