Part 1 of this technical report provides the numbering scheme for all standards associated with paper-based and image-based check payments that collectively will be referred to as check-related payments. The basic numbering scheme is divided into two sections; core standards and application...
This Recommendation analyses security threats encountered in service function chaining based on software-defined networking (SDN) and specifies security guidelines for SDN-based service function chaining architectures. This Recommendation: - describes a general security architecture for SDN-based...
This Recommendation specifies biosignal sensor requirements and an architecture for a biosignal authentication model that allows mobile users to ensure personal identification using biosignals, such as those obtained from a ballistocardiogram (BCG), electroencephalogram
This report will provide: • A description of how quantum computers work, and the different architectures being experimented with today • A description of the technological hurdles remaining that are thwarting advancement to a large-scale quantum computer • A list of the major companies, agencies...
This technical report provides information about quantum computers and post-quantum cryptography for people working in the financial services industry. In particular, this report investigates how a large-scale quantum computer could impact the security of commonly used protocols within the CMS and...
This Standard applies to particular dose-related notification and alert messages appearing on the operating consoles of CT scanners. This Standard is not intended to define all notification, alert, or other messages resident on any CT scanner.
This Recommendation aims to provide various use cases for structured threat information expression (STIX), which is a structured language for describing cyber threat information. It is targeted to support a range of use cases involved in cyber threat management, including analysing cyber threats,...
This Recommendation provides a technical framework for countering mobile in-application advertising spam. In this framework, functional components, filtering rules and workflows are specified. In addition, this Recommendation proposes a feedback platform for countering mobile in-application...
This standard applies to rotary-type positive displacement meters designed for revenue measurement of fuel gas. Part I comprises a list of definitions and terms used throughout the standard. Part II covers the construction requirements for qualifying new-type rotary meters. Part III covers the...
This Recommendation supports the protection of network resources using security services based on software-defined networking (SDN). This Recommendation covers: - classification of the network resources that can be protected by SDN-based security services; - definition of security services based on...
This Recommendation describes signalling requirements and service architecture to provide content distribution services over a managed peer-to-peer network. This Recommendation describes a service architecture to provide stable and manageable content distribution services by specifying additional...
This Recommendation specifies a content distribution protocol over managed P2P communications. It describes the following: - overview of content delivery peer protocol; - protocol messages and its parameters; - protocol behaviours
This Recommendation provides a security framework and requirements for big data analytics in mobile Internet services. The intent of this Recommendation is to study the challenges brought forward by big data analytics, and the specific security requirements for mobile Internet services as well as...
This Recommendation includes the following items: - overview of object identifier (OID)-based resolution framework for Internet of things (IoT) grouped services; - requirements for resolution framework for IoT grouped services; and - OID-based resolution framework and scenarios for IoT grouped...
This Recommendation on the FIDO universal authentication framework (UAF) describes the components, protocols and interfaces that make up the FIDO UAF strong authentication ecosystem.
This Recommendation addresses the telebiometric access control requirements and architecture of personal identity verification platform, which allows users to ensure personal identification using biometrics with smart ID cards for logical and physical access control. Biometrics has been considered...
The application layer protocol in this Recommendation defines the requirements for transport protocols. Each transport binding defines the details of how such transport layer connections should be set up, in a manner that meets the requirements of the application layer protocol.
This Recommendation describes hybrid authentication and key management mechanisms in the client-server model. It analyses the typical service scenarios, security threats and attack methods, and provides technical methods to mitigate these risks