IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniqu...
1 Scope
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
Ten mechanisms are specified in this document. The first five mechanisms do not involve an on-line trusted third party and the last five make use of on-line trusted third parties. In both of these two…
Information technology — Home electronic system (HES) architecture — Part 5-12: Intelligent grouping...
1 Scope
This part of ISO/IEC 14543
– specifies the test and verification methods for an IGRS remote access (RA) user or device,
– defines the structure of a user and device testing system for IGRS remote access,
– describes and specifies the exchange process between a user or device-under-test with a
standard IGRS RA service platform (IRSP), and
– describes and specifies the rules to have…
Information technology — Data protocol for radio frequency identification (RFID) for item management...
1 Scope
This document specifies rules and code structures associated with the data constructs for RFID for item management. In particular, it:
— defines the application family identifier (AFI), including the range of code values that are available to use for RFID for item management;
— defines the data format, including the range of code values that are available to use for RFID for item…
Information technology for learning, education, and training — Learner mobility achievement informat...
1 Scope
This document defines a model for the recording and exchange of learner achievement information among student information systems (SIS) (also known as student management information systems), as well as the aggregation of information by third party suppliers.
In addition, this document defines refinements to the learner mobility achievement award (LMAI) model for representing the…
Information technology — Concepts and usage of metadata — Part 22: Registering and mapping developme...
1 Scope
This document provides a usage scenario that utilizes the facilities defined in ISO/IEC 11179-3, ISO/IEC 19763-5 and ISO/IEC 19763-10 to demonstrate the registration of the mapping between process models. The availability of these registered process model mappings will help to promote the reuse of process models.
The scope of this document is limited to a discussion of the process…
Information technology — Media context and control — Part 5: Data formats for interaction devices
1 Scope
This document specifies syntax and semantics of the data formats for interaction devices by providing a standardized format for interfacing actuators and sensors by defining XML schema-based language named Interaction Information Description Language (IIDL). IIDL provides a basic structure with common information for communication with various actuators and sensors in consistency. Device…
Information technology — Media context and control — Part 6: Common types and tools
1 Scope
This document provides definitions of data types and tools, which are used in other parts of the ISO/IEC 23005 series, but are not specific to a single part.
This document specifies syntax and semantics of the data types and tools common to the tools defined in the other parts of the ISO/IEC 23005 series, such as basic data types which are used as basic building blocks in more than one…
Information technology — Security techniques — Key management — Part 5: Group key management
1
Scope
This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.
It defines symmetric key based key establishment mechanisms for multiple entities with a key distribution centre (KDC), and defines…
Information technology — Generic coding of moving pictures and associated audio information — Part 1...
1.1 Scope
This Recommendation | International Standard specifies the system layer of the coding. It was developed principally to support the combination of the video and audio coding methods defined in Parts 2 and 3 of ISO/IEC 13818. The system layer supports six basic functions:
1) the synchronization of multiple compressed streams on decoding;
2) the interleaving of multiple compressed…
Information technology — Lossy/lossless coding of bi-level images
1 Scope
This Recommendation | International Standard1 defines methods for coding bi-level images and sets of images (documents consisting of multiple pages). It is particularly suitable for bi-level images consisting of text and dithered (halftone) data.
The methods defined permit lossless (bit-preserving) coding, lossy coding, and progressive coding. In progressive coding, the first image is…