Web 4.0 and virtual worlds

Available (352)

Showing 1 - 12 per page



Christine Perey

Country
Switzerland
Impact on SMEs (8th Open Call)
HSTP shall be interoperable with IoT systems in such a way that the entities are able to exchange information and mutually use the information in an efficient way consistent with IEEE 2413 Architectural Framework for IoT. Many innovative European SMEs, and companies that use IoT will benefit from the adoption of HSTP because it will remove the need to create an entirely proprietary protocol for the
transaction of systems. HSTP shall provide interoperability of observations coming from physical sensors. It will also enable machine learning operations on sensor data, i.e., observations and measurements, accessible in the Spatial Web. HSTP will use the HyperSpatial Modeling Language (HSML), a human- and machine-readable modeling language and semantic data ontology schema that describes objects, relations, actions, activities and their permissions.
Open Call
Organization
PEREY Research & Consulting Switzerland
Portrait Picture
Christine Perey
Proposal Title (8th Open Call)
IEEE SA HyperSpatial Transaction Protocol Spec Editor and Leadership (co-chair) of IEEE P2874 WG
Standards Development Organisation
Topic (8th Open Call)

Christoph Runde

Country
Germany
Impact on SMEs (8th Open Call)
The metaverse and eXtended Reality market is characterised by an intense battle for technological ecosystems. American companies dominate the XR platforms for desktop and handheld XR; VR headsets come from the USA, Taiwan or China; game consoles come from Japan or the USA. In Europe, there are many software manufacturers and a few hardware manufacturers. For suitable market access, standardisation is absolutely critical to digital sovereignty and strategic autonomy, and finally to the success of Europe’s SMEs.
Open Call
Organization
Virtual Dimension Center
Portrait Picture
Christoph Runde
Proposal Title (8th Open Call)
Mapping and Structuring the Standardisation Landscape of Virtual Worlds
Standards Development Organisation
Topic (8th Open Call)

Privacy technologies - Consent record information structure

This document specifies an interoperable, open and extensible information structure for recording PII principals' consent to PII processing. This document provides requirements and recommendations on the use of consent receipts and consent records associated with a PII principal's PII processing consent, aiming to support the:- provision of a record of the consent to the PII principal;- exchange of consent information between information systems;- management of the life cycle of the recorded consent.

ISO/IEC TS 27560:2023

Recommended Practice for E-Invoice Business Using Blockchain Technology

Described in this standard is the blockchain-based application reference architecture of e-invoice business, including roles of participants, typical business scenarios, platform frameworks, and security requirements.

IEEE 2142.1-2021

Information technology - Security techniques - Privacy engineering for system life cycle processes

This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes:(1) the relationship between privacy engineering and other engineering viewpoints (system engineering, security engineering, risk management); and(2) privacy engineering activities in key engineering processes such as knowledge management, risk management, requirement analysis, and architecture design.The intended audience includes engineers and practitioners who are involved in the development, implementation or operation of systems that need privacy consideration, as well as managers in organizations responsible for privacy, development, product management, marketing, and operations.

ISO/IEC TR 27550:2019

Information technology - Online privacy notices and consent

This document specifies controls which shape the content and the structure of online privacy notices as well as the process of asking for consent to collect and process personally identifiable information (PII) from PII principals.This document is applicable in any online context where a PII controller or any other entity processing PII informs PII principals of processing.

ISO/IEC 29184:2020

Information technology - Security techniques - Guidelines for privacy impact assessment

This document gives guidelines for:- a process on privacy impact assessments, and- a structure and content of a PIA report.It is applicable to all types and sizes of organizations, including public companies, private companies, government entities and not-for-profit organizations. This document is relevant to those involved in designing or implementing projects, including the parties operating data processing systems and services that process PII.

ISO/IEC 29134:2023

Information technology - Security techniques - Privacy framework

ISO/IEC 29100:2011 provides a privacy framework which- specifies a common privacy terminology;- defines the actors and their roles in processing personally identifiable information (PII);- describes privacy safeguarding considerations; and- provides references to known privacy principles for information technology.ISO/IEC 29100:2011 is applicable to natural persons and organizations involved in specifying, procuring, architecting, designing, developing, testing, maintaining, administering, and operating information and communication technology systems or services where privacy controls are required for the processing of PII.

ISO/IEC 29100:2011

Information security, cybersecurity and privacy protection - Privacy enhancing data de-identification framework

This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data.This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller’s behalf, implementing data de-identification processes for privacy enhancing purposes.

ISO/IEC 27559:2022

Information security, cybersecurity and privacy protection - User-centric privacy preferences management framework

This document provides a user-centric framework for handling personally identifiable information (PII), based on privacy preferences.

ISO/IEC 27556:2022

Privacy enhancing data de-identification terminology and classification of techniques

This document provides a description of privacy-enhancing data de-identification techniques, to be used to describe and design de-identification measures in accordance with the privacy principles in ISO/IEC 29100.In particular, this document specifies terminology, a classification of de-identification techniques according to their characteristics, and their applicability for reducing the risk of re-identification.This document is applicable to all types and sizes of organizations, including public and private companies, government entities, and not-for-profit organizations, that are PII controllers or PII processors acting on a controller's behalf, implementing data de-identification processes for privacy enhancing purposes.

ISO/IEC 20889:2018