Standards Watch

  • Home
  • Standards Watch

Click on the interactive map below or utilise the filtering interface on the side to browse the items that are currently in our Standards Watch*.

IT_general it_security software networking cloud computing other iot big data ai cybersecurity data tecnologies iso iec 27005 5g communications iso iec etsi osi it terminal application information computer grafics information coding office machine interface interconnection equipment languages used in it microprocessor system data storage services

The Standards Watch of StandICT.eu monitors the status of ICT standards at international level, starting from the five priority areas of the Digital Single Market: 5G communications,cloud computing,cybersecurity,data technology, and IoT – Internet of Things.

In particular, special attention is given to the rapidly evolving ICT topics of: Artificial Intelligence, Big Data, IoT. Gradually, the Standards Watch will be expanded to other ICT domains and topics, with the aim of better identifying gaps, needs & opportunities and consequently stimulating European Experts to pursue the openings granted by the StandICT.eu initiative.

This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:
a) the relationships and constraints between all the data elements required for signing and verifying;
b) a signature mechanism, i.e., how to produce a signature of a message with the data elements required for signing;
c) a verification mechanism, i.e., how to verify a signature of a message with the data elements required for verifying.

Tuesday, April 1, 2008
Want to flag something? Write here in the WikiWatch

Read more

ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages of arbitrary length.
This part of ISO/IEC 14888 contains general principles and requirements for digital signatures with appendix. It also contains definitions and symbols which are used in all parts of ISO/IEC 14888.

Tuesday, April 1, 2008
Want to flag something? Write here in the WikiWatch

Read more

Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and services, etc. This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP services, the generic security requirements, who should provide what type of security, what the possible security solutions are, and the operational use and management of TTP service security.

Saturday, June 1, 2002
Want to flag something? Write here in the WikiWatch

Read more

This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized. The security of all three schemes is based on the difficulty of factorizing large numbers. All three schemes can provide either total or partial message recovery.

Wednesday, December 1, 2010
Want to flag something? Write here in the WikiWatch

Read more

This International Standard specifies a set of check character systems capable of protecting strings against errors which occur when people copy or type data. This International Standard specifies conformance requirements for products described as generating check characters or checking strings using the systems given in this International Standard.

Saturday, February 1, 2003
Want to flag something? Write here in the WikiWatch

Read more

The present document is a study of the continuation and integration of some HGI Smart Home activities into oneM2M, following the (PT2) HGI announcement of its closure by June 2016. It includes the description of HGI SH deliverables versus the appropriate oneM2M deliverables for the integration of these HGI achievements.

Thursday, September 1, 2016
Want to flag something? Write here in the WikiWatch

Read more

The present document is a study of interworking between oneM2M Architecture and 3GPP Rel-13 architecture for Service Capability Exposure as defined in the release 13 version of ETSI TS 123 682 [i.5]. The key objective and value is analyzed and described. The document also investigates the potential solution in oneM2M by evaluating the existing technical solutions.

Thursday, September 1, 2016
Suggested Gaps: 
IoT / Service and Application / Data interoperability
Want to flag something? Write here in the WikiWatch

Read more

The present document discusses the concepts which are foundational for Cross-Cutting Context Information Management (C3IM) and their application to a selection of Use Cases from the domains of Smart Cities, Smart Agrifood and Smart Industry. These areas of application, together with the general area of Internet of Things (IoT) technology and services, are expected to especially benefit from usage of cross-cutting (cross domain) context information, and from a set of specifications for the APIs supporting C3IM. The present document covers the following:

Saturday, September 1, 2018
Want to flag something? Write here in the WikiWatch

Read more

The present document outlines the motivation for the deployment of IPv6 in enterprises, the objectives, the benefits, the risks, the challenges, the technology guidelines, the different choices that arise when designing IPv6-only or dual-stack enterprise network, step-by-step process, the addressing plan, and the milestones.

Thursday, June 1, 2017
Want to flag something? Write here in the WikiWatch

Read more

Pages