This standard defines a protocol for applying the NVM Express over Fabrics interface to Fibre Channel. This standard defines how the Fibre Channel services and the defined Information Units (IUs) are used to perform the services defined by the NVM Express over Fabrics specification.
Specifies a taxonomy and an ontology for blockchain and distributed ledger technologies (DLT). The taxonomy includes a taxonomy of concepts, a taxonomy of DLT systems and a taxonomy of application domains, purposes and economy activity sections for use cases. The ontology includes classes and attributes as well as relations between concepts. The audience includes but is not limited to academics, architects, customers, users, tool developers, regulators, auditors and standards development organizations.
Introduces the still image part of ISO/IEC 13249 (all parts); gives the references necessary for this part of ISO/IEC 13249; defines notations and conventions specific to this part of ISO/IEC 13249; defines concepts specific to this part of ISO/IEC 13249; and defines the still image user-defined types and their associated routines.
ISO/IEC 14776-151:2010(E) defines the rules for exchanging informationbetween SCSI devices using a serial interconnect. It defines the rules forexchanging information between ATA hosts and ATA devices using the same serialinterconnect. It is a functional description. Conforming implementations mayemploy any design technique that does not violate interoperability.
Identifies the objective of a time-stamping authority; describes a general model on which time-stamping services are based; defines time-stamping services; and defines the basic protocols between the involved entities.
Specifies an image interchange format for biometric person identification or verification technologies that utilize human vascular biometric images and can be used for the exchange and comparison of vascular image data.
Specifies the conformance and reference software implementing the test vectors comprising media presentation descriptions, segments and combinations thereof in ISO/IEC 23009-1, and the corresponding software modules.
Describes the threats, design techniques and control issues associated with reference network scenarios. For each scenario, it provides detailed guidance on the security threats and the security design techniques and controls required to mitigate the associated risks. Where relevant, it includes references to ISO/IEC 27033-4 to ISO/IEC 27033-6 to avoid duplicating the content of those documents. The information is for use when reviewing technical security architecture/design options and when selecting and documenting the preferred technical security architecture/design and related security controls, in accordance with ISO/IEC 27033-2.
Specifies the procedures to be followed in preparing, publishing, and maintaining a register of graphic characters. Annex A (Advisory Group) forms an integral part of this standard. Annex B (Forms for proposal) is for information only.
Specifies the following Message Authentication Code (MAC) algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block ciphers specified in ISO/IEC 18033-3 and the stream ciphers specified in ISO/IEC 18033-4: UMAC; Badger; Poly1305-AES; GMAC.