id
stringlengths 7
13
| title
stringlengths 7
396
| type
stringclasses 2
values | version
stringclasses 245
values | url
stringlengths 90
98
| scope
stringlengths 0
83.8k
|
---|---|---|---|---|---|
119 411-6
|
Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 6: Requirements for Trust Service Providers issuing publicly trusted S/MIME certificates
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119400_119499/11941106/01.01.01_60/ts_11941106v010101p.pdf
|
The present document specifies policy and security requirements for the issuance, maintenance and life-cycle management of S/MIME certificates as defined in the S/MIME Baseline Requirements (SBR) [1] in the context of the ETSI Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates series. An S/MIME certificate for the purposes of the present document can be identified by the existence of an Extended Key Usage (EKU) for id-kp-emailProtection (OID: 1.3.6.1.5.5.7.3.4) and the inclusion of an email address (in the form of an rfc822Name or an otherName of type id-on-SmtpUTF8Mailbox) in the subjectAltName extension. These policy and security requirements support reference certificate policies for the issuance, maintenance and life- cycle management of S/MIME certificates issued to mailboxes (containing only an email address), natural persons (including natural persons associated with a legal person) and to legal persons, respectively. The present document does not specify how the requirements identified can be assessed by an independent party, including requirements for information to be made available to such independent assessors, or requirements on such assessors. NOTE 1: See ETSI EN 319 403-1 [i.1] for guidance on assessment of TSP's processes and services, expanded as relevant by ETSI TS 119 403-2 [i.2] for additional requirements for publicly-trusted certificates, and by ETSI TS 119 403-3 [i.3] for additional requirements for EU qualified TSPs. NOTE 2: The present document integrates all the policy requirements of the CA/Browser Forum S/MIME Baseline Requirements (SBR) [1] with ETSI EN 319 411-1 [2] for the [LCP], [NCP], and/or [NCP+] certificate policies, and with ETSI EN 319 411-2 [3] for the [QCP-l], [QCP-n], [QCP-l-qscd], and/or [QCP-n-qscd] certificate policies.
|
119 134-5
|
Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signature (XAdES) Testing Compliance & Interoperability; Part 5: Conformance Testing for XAdES Baseline Profile
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11913405/01.01.01_60/ts_11913405v010101p.pdf
|
The present document defines the sets of checks required for testing conformance of XAdES signatures against extended XAdES signatures as specified ETSI EN 319 132-2 [2]. It defines only the checks that are specific to extended XAdES signatures. The set of checks that are common to both extended and baseline XAdES signatures, are defined in ETSI TS 119 134-4 [4]. The complete set of checks to be performed by any tool on XAdES extended signatures is the union of the sets defined within the present document and the set of common checks for testing conformance against ETSI EN 319 132-1 [1] and ETSI EN 319 132-2 [2] defined in ETSI TS 119 134-4 [4], as indicated in the normative clauses of the present document. The present document does not specify checks leading to conclude whether a signature is technically valid or not (for instance, it does not specify checks for determining whether the cryptographic material present in the signature may be considered valid or not). In consequence no conclusion may be inferred regarding the technical validity of a signature that has been successfully tested by any tool conformant to the present document. The only possible inferences are the ones explicitly mentioned in the second paragraph of the present clause. Checks specified by the present document are exclusively constrained to elements specified by ETSI EN 319 132-1 [1] and to certain elements specified by XMLSig [3] that are re-used in XAdES schema definition (like ds:keyInfo). Regarding XAdES properties, the present document does not addresses the structural requirements that are defined by the XAdES XML Schema that are suitably addressed in ETSI TS 119 134-4 [4]. The present document does not address either requirements that are common to both XAdES signatures as specified in ETSI EN 319 132-1 [1] and ETSI EN 319 132-2 [2]. The present document is intentionally not linked to any software development technology and is also intentionally agnostic on implementation strategies. This is one of the reasons why the test assertions set specified in the present document includes tests on the correctness of the structure of all the elements specified by XAdES [1].
|
119 403-3
|
Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment; Part 3: Additional requirements for conformity assessment bodies assessing EU qualified trust service providers
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119400_119499/11940303/01.01.01_60/ts_11940303v010101p.pdf
|
The present document defines specific supplementary requirements for the application of ETSI EN 319 403 [1] aimed at conformity assessments (audits) of qualified trust service providers (QTSPs) and the qualified trust services (QTSs) they provide, as well as of trust service providers, without qualified status, intending to start providing qualified trust services, against the requirements of Regulation (EU) No 910/2014 [i.1] assuming the use of ETSI policy requirement standards but not precluding use of other specifications. In particular, the present document defines requirements for conformity assessment reports, including their content.
|
119 403-2
|
Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment; Part 2: Additional requirements for Conformity Assessment Bodies auditing Trust Service Providers that issue Publicly-Trusted Certificates
|
TS
|
1.3.1
|
http://www.etsi.org/deliver/etsi_ts/119400_119499/11940302/01.03.01_60/ts_11940302v010301p.pdf
|
The present document defines specific supplementary requirements to those defined in ETSI EN 319 403-1 [1] for CABs performing audits based on ETSI EN 319 411-1 [i.9] and those from CA/Browser Forum, [i.7] and [i.8]. In particular, the present document defines the requirements for audit attestations, including their content.
|
119 322
|
Electronic Signatures and Trust Infrastructure (ESI); Schema for machine-readable cryptographic algorithms, and cipher suites catalogues
|
TS
|
1.2.1
|
http://www.etsi.org/deliver/etsi_ts/119300_119399/119322/01.02.01_60/ts_119322v010201p.pdf
|
The present document provides a generic schema for machine-readable cryptographic algorithms, and cipher suites catalogues based on IETF RFC 5698 [1] and specifies different formats such as XML [i.4] and JSON [i.5]. The present document is limited to a descriptive schema for algorithms and all parameters involved. No assessment of the suitability of any cryptographic algorithm, or cipher suite is given in the present document. The present document focuses on signature-related algorithms, and cipher suites, and puts an emphasis on enabling a refined suitability description of the algorithms with respect to its status of recommendation as well as the specific context of usage an algorithm is assessed for.
|
119 144-2
|
Electronic Signatures and Infrastructures (ESI); PAdES digital signatures - Testing Conformance and Interoperability; Part 2: Test suites for testing interoperability of PAdES baseline signatures
|
TS
|
2.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11914402/02.01.01_60/ts_11914402v020101p.pdf
|
The present document defines a number of test suites to assess the interoperability between implementations claiming conformance to PAdES baseline signatures [2]. The test suites are defined with four different layers reflecting the four different levels of PAdES baseline signatures: • Tests suite addressing interoperability between applications claiming B-B level conformance. • Tests suite addressing interoperability between applications claiming B-T level conformance. • Tests suite addressing interoperability between applications claiming B-LT level conformance. • Tests suite addressing interoperability between applications claiming B-LTA level conformance. Test suites also cover augmentation of PAdES baseline signatures and negative test cases. These test suites are agnostic of the PKI infrastructure. Any PKI infrastructure can be used including the one based on EU Member States Trusted Lists.
|
119 144-2
|
Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature (PAdES) Testing Compliance & Interoperability; Part 2: Test Suite for PAdES interoperability test events
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11914402/01.01.01_60/ts_11914402v010101p.pdf
|
The present document defines a number of test suites to assess the interoperability between implementations claiming conformance to PAdES baseline signatures [2]. The test suites are defined with four different layers reflecting the four different levels of PAdES baseline signatures: • Tests suite addressing interoperability between applications claiming B-B level conformance. • Tests suite addressing interoperability between applications claiming B-T level conformance. • Tests suite addressing interoperability between applications claiming B-LT level conformance. • Tests suite addressing interoperability between applications claiming B-LTA level conformance. Test suites also cover augmentation of PAdES baseline signatures and negative test cases. These test suites are agnostic of the PKI infrastructure. Any PKI infrastructure can be used including the one based on EU Member States Trusted Lists.
|
119 142-3
|
Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 3: PAdES Document Time-stamp digital signatures (PAdES-DTS)
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11914203/01.01.01_60/ts_11914203v010101p.pdf
|
The present document specifies a type of PDF digital signatures, as specified in ISO 32000-1 [1], based on time-stamps. It specifies a format for PAdES digital signatures using a Document Time-stamp - as defined in ETSI EN 319 142-1 [2] - as a digital signature intended to specifically prove the integrity and existence of a PDF document as defined in ISO 32000-1 [1], rather than proving any form of authentication or proof of origin. NOTE: This format does not meet the requirements of advanced electronic signature and advanced electronic seal as defined in Regulation (EU) No 910/2014 [i.4], as it is not capable of identifying the signer.
|
119 134-5
|
Electronic Signatures and Infrastructures (ESI); XAdES digital signatures - Testing Conformance and Interoperability; Part 5: Testing Conformance of extended XAdES signatures
|
TS
|
2.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11913405/02.01.01_60/ts_11913405v020101p.pdf
|
The present document defines the sets of checks required for testing conformance of XAdES signatures against extended XAdES signatures as specified ETSI EN 319 132-2 [2]. It defines only the checks that are specific to extended XAdES signatures. The set of checks that are common to both extended and baseline XAdES signatures, are defined in ETSI TS 119 134-4 [4]. The complete set of checks to be performed by any tool on XAdES extended signatures is the union of the sets defined within the present document and the set of common checks for testing conformance against ETSI EN 319 132-1 [1] and ETSI EN 319 132-2 [2] defined in ETSI TS 119 134-4 [4], as indicated in the normative clauses of the present document. The present document does not specify checks leading to conclude whether a signature is technically valid or not (for instance, it does not specify checks for determining whether the cryptographic material present in the signature may be considered valid or not). In consequence no conclusion may be inferred regarding the technical validity of a signature that has been successfully tested by any tool conformant to the present document. The only possible inferences are the ones explicitly mentioned in the second paragraph of the present clause. Checks specified by the present document are exclusively constrained to elements specified by ETSI EN 319 132-1 [1] and to certain elements specified by XMLSig [3] that are re-used in XAdES schema definition (like ds:keyInfo). Regarding XAdES properties, the present document does not addresses the structural requirements that are defined by the XAdES XML Schema that are suitably addressed in ETSI TS 119 134-4 [4]. The present document does not address either requirements that are common to both XAdES signatures as specified in ETSI EN 319 132-1 [1] and ETSI EN 319 132-2 [2]. The present document is intentionally not linked to any software development technology and is also intentionally agnostic on implementation strategies. This is one of the reasons why the test assertions set specified in the present document includes tests on the correctness of the structure of all the elements specified by XAdES [1].
|
119 144-5
|
Electronic Signatures and Infrastructures (ESI); PAdES digital signatures - Testing Conformance and Interoperability; Part 5: Testing Conformance of additional PAdES signatures
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11914405/01.01.01_60/ts_11914405v010101p.pdf
|
The present document defines the set of checks to be performed for testing conformance of PAdES signatures against additional PAdES signatures profiles as specified in ETSI EN 319 142-2 [3]. It defines only the checks that are specific to additional PAdES signatures. The set of checks that are common to both additional and baseline PAdES signatures, are defined in ETSI TS 119 144-4 [6]. The complete set of checks to be performed by any tool on additional PAdES signatures is the union of the sets defined within the present document and the set of common checks for testing conformance against ETSI EN 319 142-1 [1] and ETSI EN 319 142-2 [3] defined in ETSI TS 119 144-4 [6], as indicated in the normative clauses of the present document. The present document does not specify checks leading to conclude whether a signature is technically valid or not (for instance, it does not specify checks for determining whether the cryptographic material present in the signature may be considered valid or not). In consequence, no conclusion may be inferred regarding the technical validity of a signature that has been successfully tested by any tool conformant to the present document. Checks specified by the present document are exclusively constrained to elements specified by PAdES [1]. Regarding PAdES attributes, the present document explicitly differentiates between structural requirements that are defined on building blocks, and the requirements specified for additional PAdES signatures conformance. The present document is intentionally not linked to any software development technology and is also intentionally agnostic on implementation strategies. This is one of the reasons why the test assertions set specified in the present document includes tests on the correctness of the structure of all the elements specified by PAdES [1].
|
119 134-4
|
Electronic Signatures and Infrastructures (ESI); XAdES digital signatures - Testing Conformance and Interoperability; Part 4: Testing Conformance of XAdES baseline signatures
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11913404/01.01.01_60/ts_11913404v010101p.pdf
|
The present document defines the set of checks to be performed for testing conformance of XAdES signatures against XAdES baseline signatures as specified ETSI EN 319 132-1 [1]. The present document does not specify checks leading to conclude whether a signature is technically valid or not (for instance, it does not specify checks for determining whether the cryptographic material present in the signature may be considered valid or not). In consequence no conclusion may be inferred regarding the technical validity of a signature that has been successfully tested by any tool conformant to the present document. Checks specified by the present document are exclusively constrained to elements specified by XAdES [1] and to certain elements specified by XMLSig [3] that are re-used in XAdES schema definition (like ds:DigestMethod, ds:DigestValue). Regarding XAdES properties, the present document explicitly differentiates between structural requirements that are defined by the XAdES XML Schema, and the rest of the requirements specified by XAdES [1]. Checks corresponding to the first set of requirements are specified in the normative annex A. Checks corresponding to the second set of requirements are specified in the body part of the present document. The present document is intentionally not linked to any software development technology and is also intentionally agnostic on implementation strategies. This is one of the reasons why the test assertions set specified in the present document includes tests on the correctness of the structure of all the elements specified by XAdES [1].
|
119 134-3
|
Electronic Signatures and Infrastructures (ESI); XAdES digital signatures - Testing Conformance and Interoperability; Part 3: Test suites for testing interoperability of extended XAdES signatures
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11913403/01.01.01_60/ts_11913403v010101p.pdf
|
The present document defines a number of test suites to assess the interoperability between implementations claiming conformance to extended XAdES signatures as specified in ETSI EN 319 132-2 [2]. The present document defines test suites for each level defined in ETSI EN 319 132-2 [2]. Test suites also cover augmentation of extended XAdES signatures and negative test cases. These test suites are agnostic of the PKI infrastructure. Any PKI infrastructure can be used including the one based on EU Member States Trusted Lists.
|
119 134-2
|
Electronic Signatures and Infrastructures (ESI); XAdES digital signatures - Testing Conformance and Interoperability; Part 2: Test suites for testing interoperability of XAdES baseline signatures
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11913402/01.01.01_60/ts_11913402v010101p.pdf
|
The present document defines a number of test suites to assess the interoperability between implementations claiming conformance to XAdES baseline signatures as specified in ETSI EN 319 132-1 [1]. The test suites are defined with four different layers reflecting the four different levels of XAdES baseline signatures: • Tests suite addressing interoperability between applications claiming B-B level conformance. • Tests suite addressing interoperability between applications claiming B-T level conformance. • Tests suite addressing interoperability between applications claiming B-LT level conformance. • Tests suite addressing interoperability between applications claiming B-LTA level conformance. Test suites also cover augmentation of XAdES baseline and negative test cases. These test suites are agnostic of the PKI infrastructure. Any PKI infrastructure can be used including the one based on EU Member States Trusted Lists.
|
119 312
|
Electronic Signatures and Trust Infrastructures (ESI); Cryptographic Suites
|
TS
|
1.5.1
|
http://www.etsi.org/deliver/etsi_ts/119300_119399/119312/01.05.01_60/ts_119312v010501p.pdf
|
The present document lists cryptographic suites used for the creation and validation of digital signatures and electronic timestamps and related certificates. The present document builds on the agreed cryptographic mechanisms from SOG-IS [14]. It may be used also for electronic registered delivery services in the future. In contrast to previous versions of the present document, specific end dates are provided. The present document works on the assumption that the validity period (i.e. between notBefore and notAfter) of (qualified) end-entity certificates issued by trust services providers is typically three years. The present document focuses on interoperability issues and does not duplicate security considerations given by other standardization bodies, security agencies or supervisory authorities of the Member States. It instead provides guidance on the selection of concrete cryptographic suites that use agreed mechanisms. The use of SOG-IS agreed mechanisms is meant to help ensure a high level of security in the recommended cryptographic suites, while the focus on specific suites of mechanisms is meant to increase interoperability and simplify design choices. There is no normative requirement on selection among the alternatives for cryptographic suites given here but for all of them normative requirements apply to ensure security and interoperability. The present document also provides guidance on hash functions, (digital) signature schemes and (digital) signature suites to be used with the data structures used in the context of digital signatures and seals. For each data structure, the set of algorithms to be used is specified.
|
119 164-3
|
Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC) - Testing Compliance and Interoperability; Part 3: Test suites for testing interoperability of ASiC containers other than baseline
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11916403/01.01.01_60/ts_11916403v010101p.pdf
|
The present document defines a number of test suites to assess the interoperability between implementations claiming conformance to ASiC building blocks defined in ETSI EN 319 162-1 [1] and additional containers defined in ETSI EN 319 162-2 [2]. These test suites are agnostic of the PKI infrastructure. Any PKI infrastructure can be used including the one based on EU Member States Trusted Lists.
|
119 164-2
|
Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC) - Testing Conformance and Interoperability; Part 2: Test suites for testing interoperability of ASiC baseline containers
|
TS
|
2.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11916402/02.01.01_60/ts_11916402v020101p.pdf
|
The present document defines a number of test suites to assess the interoperability between implementations claiming conformance to ASiC baseline containers as specified in ETSI EN 319 162-1 [1]. The test suites are defined with four different layers reflecting the four different levels of ASiC baseline containers. • Tests suite addressing interoperability between applications claiming B-B level conformance. • Tests suite addressing interoperability between applications claiming B-T level conformance. • Tests suite addressing interoperability between applications claiming B-LT level conformance. • Tests suite addressing interoperability between applications claiming B-LTA level conformance. • Test suites also cover augmentation of ASiC baseline containers and negative test cases. These test suites are agnostic of the PKI infrastructure. Any PKI infrastructure can be used including the one based on EU Member States Trusted Lists.
|
119 164-2
|
Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC) Testing Compliance & Interoperability; Part 2: Test Suite for ASiC interoperability test events
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11916402/01.01.01_60/ts_11916402v010101p.pdf
|
The present document defines a number of test suites to assess the interoperability between implementations claiming conformance to ASiC baseline containers as specified in ETSI EN 319 162-1 [1]. The test suites are defined with four different layers reflecting the four different levels of ASiC baseline containers. • Tests suite addressing interoperability between applications claiming B-B level conformance. • Tests suite addressing interoperability between applications claiming B-T level conformance. • Tests suite addressing interoperability between applications claiming B-LT level conformance. • Tests suite addressing interoperability between applications claiming B-LTA level conformance. • Test suites also cover augmentation of ASiC baseline containers and negative test cases. These test suites are agnostic of the PKI infrastructure. Any PKI infrastructure can be used including the one based on EU Member States Trusted Lists.
|
119 411-5
|
Electronic Signatures and Trust Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 5: Implementation of qualified certificates for website authentication as in amended regulation 910/2014
|
TS
|
2.1.1
|
http://www.etsi.org/deliver/etsi_ts/119400_119499/11941105/02.01.01_60/ts_11941105v020101p.pdf
|
The present document defines two approaches for issuing qualified certificates for website authentication, deploying them to websites, and their consumption by web browsers. Objectives of Approach #1 (i.e. "1-QWAC Approach") 1-QWACs: a) Support coexistence of trust controls based upon meeting requirements from both the Web Browser Vendor within the meaning of Recital 65 of the Regulation (EU) 2024/1183 [i.3] and EU Trusted Lists with ETSI standards aimed at supporting EU trust controls. b) Include requirements for TLS certificates based on CA/Browser Forum Requirements [i.4] and [i.5] as applied in ETSI standards [4]. c) Authenticate the website directly by using the QWAC to establish a TLS connection between the web browser and the server. NOTE: TLS uses encryption to secure data transmitted over a network providing confidentiality, integrity, and authentication. Objectives of Approach #2 (i.e. "2-QWAC with Certificate Binding Validation Approach") 2-QWACs with Certificate Binding Validation: - Support trust controls based upon EU Trusted Lists with ETSI standards aimed at supporting EU trust controls for a QWAC, which is used to bind the identity in the QWAC to the TLS certificate(s) to be used by the web browser to establish a TLS connection between the web browser and the server. - Support trust controls based upon Web Browser Vendor Root Stores for the TLS certificate which is used to establish a TLS connection between the web browser and the server. All approaches: • aim to meet the requirements of Article 45, Article 45a, and Recital 65 of Regulation (EU) 2024/1183 [i.3]; • include requirements of qualified certificates for website authentication as specified in Regulation (EU) 2024/1183 [i.3]; and • enable the display of identity data contained in qualified certificates for website authentication and validated by the EU trust schemes in a user-friendly manner. Clause 4 specifies Trust Service Provider requirements for issuing QWACs. Clause 5 provides website operator guidance for using QWACs. Clause 6 specifies web browser requirements for consuming QWACs.
|
119 144-4
|
Electronic Signatures and Infrastructures (ESI); PAdES digital signatures - Testing Conformance and Interoperability; Part 4: Testing Conformance of PAdES baseline signatures
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11914404/01.01.01_60/ts_11914404v010101p.pdf
|
The present document defines the set of checks to be performed for testing conformance of PAdES signatures against PAdES baseline signatures as specified in ETSI EN 319 142-1 [1]. The present document does not specify checks leading to conclude whether a signature is technically valid or not (for instance, it does not specify checks for determining whether the cryptographic material present in the signature may be considered valid or not). In consequence, no conclusion may be inferred regarding the technical validity of a signature that has been successfully tested by any tool conformant to the present document. Checks specified by the present document are exclusively constrained to elements specified by PAdES [1]. Regarding PAdES attributes, the present document explicitly differentiates between structural requirements that are defined on building blocks, and the requirements specified for PAdES baseline signatures conformance. The present document is intentionally not linked to any software development technology and is also intentionally agnostic on implementation strategies. This is one of the reasons why the test assertions set specified in the present document includes tests on the correctness of the structure of all the elements specified by PAdES [1].
|
119 144-3
|
Electronic Signatures and Infrastructures (ESI); PAdES digital signatures - Testing Conformance and Interoperability; Part 3: Test suites for testing interoperability of additional PAdES signatures
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11914403/01.01.01_60/ts_11914403v010101p.pdf
|
The present document defines a number of test suites to assess the interoperability between implementations claiming conformance to additional PAdES signatures profiles [3]. The present document defines test suites for each profile defined in ETSI EN 319 142-2 [3]. Test suites also cover augmentation of additional PAdES signatures and negative test cases. These test suites are agnostic of the PKI infrastructure. Any PKI infrastructure can be used including the one based on EU Member States Trusted Lists.
|
119 101
|
Electronic Signatures and Infrastructures (ESI); Policy and security requirements for applications for signature creation and signature validation
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/119101/01.01.01_60/ts_119101v010101p.pdf
|
The present document provides general security and policy requirements for applications for signature creation, validation and augmentation. The present document is primarily relevant to the following actors: • Implementers and providers of applications for signature creation, signature validation and/or signature augmentation, who need to ensure that relevant requirements are covered. • Actors that integrate applications for signature creation, signature validation and/or signature augmentation components with business process software (or use standalone software), who want to ensure proper functioning of the overall signature creation/validation/augmentation process and that the signature creation/validation is done in a sufficiently secure environment. The present document is applicable to these actors, and their evaluators (for a self-evaluation or an evaluation by a third party) to have a list of criteria against which to check the implementation. The requirements cover applications for signature creation, signature validation and/or signature augmentation, i.e. the implementation and provision of the Signature Creation/Validation/Augmentation Application modules (SCA/SVA/SAA), the driving application (DA), the communication between the SCA and the signature creation device (SCDev) and the environment in which the SCA/SVA/SAA is used. It also specifies user interface requirements, while the user interface can be part of the SCA/SVA/SAA or of the DA which calls the SCA/SVA/SAA. Any entity using SCA/SVA/SAA components in its business process acts as driving application. The document covers: • Legal driven policy requirements. • Information security (management system) requirements. • Signature creation, signature validation and signature augmentation processes requirements. • Development and coding policy requirements. • General requirements. Protection Profiles (PP) for signature creation applications and signature validation applications are out of scope and are defined in the CEN standard "Protection Profiles for Signature Creation & Validation Applications" [i.9]. General requirements for trust service providers are provided in ETSI EN 319 401 [i.24]. Requirements for trust service providers providing signature creation or validation services are out of scope. Requirements on trust service providers providing signature creation services are to be defined in ETSI TS 119 431 [i.22], with CEN EN 419 241 [i.21] defining requirements for a remote signature creation device. Requirements on trust service providers providing signature validation services are to be defined in ETSI TS 119 441 [i.23].
|
118 140
|
oneM2M Modbus Interworking (oneM2M TS-0040 version 4.0.0 Release 4)
|
TS
|
4.0.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118140/04.00.00_60/ts_118140v040000p.pdf
|
The present document specifies the oneM2M and Modbus interworking technologies that enable Modbus devices and oneM2M entities produce/consume services. Clause 5 defines the interworking architecture model that describes where the Modbus IPE is hosted and how the IPE is composed with. Clause 6 defines the architecture aspects that mainly describes Modbus services to oneM2M resource mapping structure and rules. Furthermore, this explains the IPE registration and interworking procedures.
|
118 133
|
Interworking Framework (oneM2M TS-0033 v4.0.1 Release 4)
|
TS
|
4.0.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118133/04.00.01_60/ts_118133v040001p.pdf
|
The present document defines general guidelines when interworking between external Proximal IoT technologies which are not aware of oneM2M-defined functionality, and the oneM2M system (i.e. the interaction between non-oneM2M- aware devices, gateways or applications (non-oneM2M entities) and oneM2M-defined entities). In the present document guidelines are defined on how to use oneM2M-defined resources to represent the state, events, actions, procedures, services provided by the non-oneM2M entities and how to expose oneM2M functions or services represented by oneM2M-defined resource to non-oneM2M Proximal IoT technologies. Therefore, services provided by non-oneM2M entities can be consumed by oneM2M entities via the oneM2M defined interfaces and vice versa. When following these guidelines, oneM2M-aware entities consuming services provided by non-oneM2M-aware entities via the specified interworking methods do not need to know anything about external Proximal IoT technologies. Also entities in an external Proximal IoT network that are not oneM2M-aware can consume services provided by oneM2M entities when exposed to the external Proximal IoT network according to the specified methods.
|
118 132
|
MAF and MEF Interface Specification (oneM2M TS-0032 version 4.0.1 Release 4)
|
TS
|
4.0.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118132/04.00.01_60/ts_118132v040001p.pdf
|
The present document specifies communication between the M2M Authentication Function (MAF) and MAF clients on the reference point Mmaf and between the M2M Enrolment Function (MEF) and MEF clients on the reference point Mmef.
|
118 132
|
MAF and MEF Interface Specification (oneM2M TS-0032 version 2.0.2 Release 2A)
|
TS
|
2.0.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118132/02.00.02_60/ts_118132v020002p.pdf
|
The present document specifies communication between the M2M Authentication Function (MAF) and MAF clients on the reference point Mmaf and between the M2M Enrolment Function (MEF) and MEF clients on the reference point Mmef.
|
118 130
|
oneM2M; Ontology based Interworking (oneM2M TS-0030 version 4.0.1 Release 4)
|
TS
|
4.0.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118130/04.00.01_60/ts_118130v040001p.pdf
|
The present document specifies Generic Interworking of the oneM2M System with external systems (e.g. Area Networks containing non-oneM2M devices) that can be described with ontologies that are compliant with oneM2M's Base Ontology, specified in ETSI TS 118 112 [3]. In oneM2M Release 2 the specification for Ontology based Interworking had been contained in clauses 8 and 9 of ETSI TS 118 112 [3].
|
118 130
|
oneM2M; Ontology based Interworking (oneM2M TS-0030 version 3.0.2 Release 3)
|
TS
|
3.0.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118130/03.00.02_60/ts_118130v030002p.pdf
|
The present document specifies Generic Interworking of the oneM2M System with external systems (e.g. Area Networks containing non-oneM2M devices) that can be described with ontologies that are compliant with oneM2M's Base Ontology, specified in ETSI TS 118 112 [3]. In oneM2M Release 2 the specification for Ontology based Interworking had been contained in clauses 8 and 9 of ETSI TS 118 112 [3].
|
118 125
|
Definition of product profiles (oneM2M TS-0025 version 2.0.0 Release 2A)
|
TS
|
2.0.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118125/02.00.00_60/ts_118125v020000p.pdf
|
The present document specifies the detailed defined product profiles that can be used by manufactures and service providers where for each dedicated product, one of the defined product profile can be selected. The product profile would provide guidance to what features will be implemented, what features should be implemented and what features may be implemented. The present document also describes the test purposes that need to go through if the product need to be certified.
|
119 132-3
|
Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 3: Incorporation of Evidence Record Syntax (ERS) mechanisms in XAdES
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11913203/01.01.01_60/ts_11913203v010101p.pdf
|
The present document specifies the semantics and the syntax for a new unsigned XAdES qualifying property able to contain evidence records. The present document specifies the rules that govern the incorporation of evidence records within a XAdES signature or a legacy XAdES signature. NOTE: The present specification allows to incorporate Evidence Records in two different formats, namely: the XML format for ERS specified in IETF RFC 6283 (2011): "Extensible Markup Language Evidence Record Syntax (XMLERS)" [5], and the ASN.1 format for ERS specified in IETF RFC 4998 (2007): "Evidence Record Syntax (ERS)" [8]. The present document also specifies a new level for XAdES signatures, incorporating one or more than one of the aforementioned qualifying properties. The signatures specified in the present document are not baseline XAdES signatures.
|
119 124-5
|
Electronic Signatures and Infrastructures (ESI); CAdES digital signatures - Testing Conformance and Interoperability; Part 5: Testing Conformance of extended CAdES signatures
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11912405/01.01.01_60/ts_11912405v010101p.pdf
|
The present document defines the checks to be performed for testing conformance of CAdES signatures against extended CAdES signatures as specified in ETSI EN 319 122-2 [2]. It defines only the checks that are specific to extended CAdES signatures. The set of checks that are common to both extended and baseline CAdES signatures, are defined in ETSI TS 119 124-4 [3]. The complete set of checks to be performed by any tool on CAdES extended signatures is the union of the sets defined within the present document and the set of common checks for testing conformance against ETSI EN 319 122-1 [1] and ETSI EN 319 122-2 [2] defined in ETSI TS 119 124-4 [3], as indicated in the normative clauses of the present document. The present document does not specify checks leading to conclude whether a signature is technically valid or not (for instance, it does not specify checks for determining whether the cryptographic material present in the signature may be considered valid or not). In consequence, no conclusion may be inferred regarding the technical validity of a signature that has been successfully tested by any tool conformant to the present document. Checks specified by the present document are exclusively constrained to elements specified by CAdES [1]. Regarding CAdES attributes, the present document explicitly differentiates between structural requirements that are defined on building blocks, and the requirements specified for extended CAdES signatures conformance. The present document is intentionally not linked to any software development technology and is also intentionally agnostic on implementation strategies. This is one of the reasons why the test assertions set specified in the present document includes tests on the correctness of the structure of all the elements specified by CAdES [1].
|
119 124-4
|
Electronic Signatures and Infrastructures (ESI); CAdES digital signatures - Testing Conformance and Interoperability; Part 4: Testing Conformance of CAdES baseline signatures
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11912404/01.01.01_60/ts_11912404v010101p.pdf
|
The present document defines the set of checks to be performed for testing conformance of CAdES signatures against CAdES baseline signatures as specified in ETSI EN 319 122-1 [1]. The present document does not specify checks leading to conclude whether a signature is technically valid or not (for instance, it does not specify checks for determining whether the cryptographic material present in the signature may be considered valid or not). In consequence, no conclusion may be inferred regarding the technical validity of a signature that has been successfully tested by any tool conformant to the present document. Checks specified by the present document are exclusively constrained to elements specified by CAdES [1]. Regarding CAdES attributes, the present document explicitly differentiates between structural requirements that are defined on building blocks, and the requirements specified for CAdES baseline signatures conformance. The present document is intentionally not linked to any software development technology and is also intentionally agnostic on implementation strategies. This is one of the reasons why the test assertions set specified in the present document includes tests on the correctness of the structure of all the elements specified by CAdES [1].
|
119 124-3
|
Electronic Signatures and Infrastructures (ESI); CAdES digital signatures - Testing Conformance and Interoperability; Part 3: Test suites for testing interoperability of extended CAdES signatures
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11912403/01.01.01_60/ts_11912403v010101p.pdf
|
The present document defines a number of test suites to assess the interoperability between implementations claiming conformance to extended CAdES signatures [2]. The present document defines test suites for each level defined in ETSI EN 319 122-2 [2]. Test suites also cover augmentation of extended CAdES signatures and negative test cases. These test suites are agnostic of the PKI infrastructure. Any PKI infrastructure can be used including the one based on EU Member States Trusted Lists.
|
119 124-2
|
Electronic Signatures and Infrastructures (ESI); CAdES digital signatures - Testing Conformance and Interoperability; Part 2: Test suites for testing interoperability of CAdES baseline signatures
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11912402/01.01.01_60/ts_11912402v010101p.pdf
|
The present document defines a number of test suites to assess the interoperability between implementations claiming conformance to CAdES baseline signatures [1]. The test suites are defined with four different layers reflecting the four different levels of CAdES baseline signatures: • Tests suite addressing interoperability between applications claiming B-B level conformance. • Tests suite addressing interoperability between applications claiming B-T level conformance. • Tests suite addressing interoperability between applications claiming B-LT level conformance. • Tests suite addressing interoperability between applications claiming B-LTA level conformance. Test suites also cover augmentation of CAdES baseline signatures and negative test cases. These test suites are agnostic of the PKI infrastructure. Any PKI infrastructure can be used including the one based on EU Member States Trusted Lists.
|
119 122-3
|
Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 3: Incorporation of Evidence Record Syntax (ERS) mechanisms in CAdES
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11912203/01.01.01_60/ts_11912203v010101p.pdf
|
The present document provides mechanism to incorporate evidence records in ASN.1 format within a CAdES signature as outlined in ETSI EN 319 122-1 [4], annex B. It specifies the attributes to be used and profiles the ERS standard (IETF RFC 4998 [2]) to provide clear rules how to incorporate ERS within a CAdES signature or a legacy CAdES signature.
|
119 102-2
|
Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 2: Signature Validation Report
|
TS
|
1.4.1
|
http://www.etsi.org/deliver/etsi_ts/119100_119199/11910202/01.04.01_60/ts_11910202v010401p.pdf
|
The present document specifies a general structure and an XML format for reporting the validation of AdES digital signatures (specified in ETSI EN 319 122-1 [i.1], ETSI EN 319 132-1 [4], ETSI EN 319 142-1 [i.3] respectively). The present document is aligned with the requirements specified in ETSI EN 319 102-1 [1].
|
118 124
|
oneM2M; OCF Interworking (oneM2M TS-0024 version 3.2.2 Release 3)
|
TS
|
3.2.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118124/03.02.02_60/ts_118124v030202p.pdf
|
The present document specifies the detailed methods for oneM2M and OCF interworking using the architecture identified in oneM2M TS-0033 [5] and annex F of ETSI TS 118 101 [2] for the following scenario: • Interworking with full mapping of the semantics of the non-oneM2M data model to Mca, see scenario number 1 listed in clause F.2 of ETSI TS 118 101 [2]. This is also in line with the interworking concepts specified in oneM2M TS-0033 [5]. This interworking scenario allows for interworking between OCF devices and oneM2M entities purely based on the common understanding of aligned information models - such as the models defined in ETSI TS 118 123 [6]. There is no limitation regarding the direction of exposure of services: Services provided by OCF devices (OCF servers) can be exposed to oneM2M entities or vice versa. The oneM2M entities do not need to be aware of any details of the OCF protocols or interfaces.
|
118 124
|
oneM2M; OIC Interworking (oneM2M TS-0024 version 2.0.2 Release 2A)
|
TS
|
2.0.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118124/02.00.02_60/ts_118124v020002p.pdf
|
The present document specifies the detailed methods for oneM2M and OCF interworking using the architecture identified in oneM2M TS-0033 [5] and annex F of ETSI TS 118 101 [2] for the following scenario: • Interworking with full mapping of the semantics of the non-oneM2M data model to Mca, see scenario number 1 listed in clause F.2 of ETSI TS 118 101 [2]. This is also in line with the interworking concepts specified in oneM2M TS-0033 [5]. This interworking scenario allows for interworking between OCF devices and oneM2M entities purely based on the common understanding of aligned information models - such as the models defined in ETSI TS 118 123 [6]. There is no limitation regarding the direction of exposure of services: Services provided by OCF devices (OCF servers) can be exposed to oneM2M entities or vice versa. The oneM2M entities do not need to be aware of any details of the OCF protocols or interfaces.
|
118 123
|
oneM2M; SDT based Information Model and Mapping for Vertical Industries [oneM2M TS-0023 version 4.8.1 Release 4]
|
TS
|
4.8.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118123/04.08.01_60/ts_118123v040801p.pdf
|
The present document describes the oneM2M defined information model for home appliances, including the description of how it is mapped with other information models from external organizations. It also explains the ontology for the home domain information model.
|
118 123
|
oneM2M; Home Appliances Information Model and Mapping (oneM2M TS-0023 version 3.7.3 Release 3)
|
TS
|
3.7.3
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118123/03.07.03_60/ts_118123v030703p.pdf
|
The present document describes the oneM2M defined information model for home appliances, including the description of how it is mapped with other information models from external organizations. It also explains the ontology for the home domain information model.
|
118 123
|
oneM2M; Home Appliances Information Model and Mapping (oneM2M TS-0023 version 2.0.2 Release 2A)
|
TS
|
2.0.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118123/02.00.02_60/ts_118123v020002p.pdf
|
The present document describes the oneM2M defined information model for home appliances, including the description of how it is mapped with other information models from external organizations. It also explains the ontology for the home domain information model.
|
118 122
|
oneM2M; Field Device Configuration (oneM2M TS-0022 version 4.5.1 Release 4)
|
TS
|
4.5.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118122/04.05.01_60/ts_118122v040501p.pdf
|
The present document specifies the architectural options, resources and procedures needed to pre-provision and maintain devices in the Field Domain (e.g. ADN, ASN/MN) in order to establish M2M Service Layer operation between the device's AE and/or CSE and a Registrar and/Hosting CSE. The resources and procedures includes information about the Registrar CSE and/or Hosting CSE needed by the AE or CSE to begin M2M Service Layer operation.
|
118 118
|
oneM2M Test Suite Structure and Test Purposes (oneM2M TS-0018 version 2.13.1 Release 2)
|
TS
|
2.13.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118118/02.13.01_60/ts_118118v021301p.pdf
|
The present document specifies oneM2M test suite structure and test purposes that are designed to evaluate the conformity of oneM2M implementations to the oneM2M specifications. It also specifies: • guidelines for description of test behaviours and definition of test purpose structure; • notations to define a test purpose for conformance testing; and • test configurations for conformance testing.
|
118 116
|
oneM2M; Secure Environment Abstraction (oneM2M TS-0016 version 4.0.1 Release 4)
|
TS
|
4.0.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118116/04.00.01_60/ts_118116v040001p.pdf
|
The present document specifies mechanisms and interfaces to abstract from different technical implementations of a secure environment as defined in ETSI TS 118 103 [1].
|
118 116
|
oneM2M; Secure Environment Abstraction (oneM2M TS-0016 version 3.0.2 Release 3)
|
TS
|
3.0.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118116/03.00.02_60/ts_118116v030002p.pdf
|
The present document specifies mechanisms and interfaces to abstract from different technical implementations of a secure environment as defined in ETSI TS 118 103 [1].
|
118 115
|
oneM2M; Testing Framework (oneM2M TS-0015 version 2.0.0 Release 2)
|
TS
|
2.0.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118115/02.00.00_60/ts_118115v020000p.pdf
|
The present document specifies a testing framework defining a methodology for development of conformance and interoperability test strategies, test systems and the resulting test specifications for oneM2M standards.
|
118 114
|
oneM2M; LWM2M Interworking (oneM2M TS-0014 version 4.0.1 Release 4)
|
TS
|
4.0.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118114/04.00.01_60/ts_118114v040001p.pdf
|
The present document specifies the interworking capabilities of the M2M Service Layer between ASN/IN/MN CSEs and LWM2M Endpoints using the architecture identified in Annex F of ETSI TS 118 101 [2] for the following interworking scenarios: • Interworking for transparent transport of encoded LWM2M Objects and commands in Content Sharing Resources between LWM2M Endpoints and M2M Applications. • Interworking with full mapping of LWM2M Objects in LWM2M Endpoints to semantically enabled Content Sharing Resources that are utilized by M2M Applications. • Interworking with one-to-one mapping of LWM2M Objects with oneM2M <mgmtObj> resources NOTE: The present document limits Content Sharing Resources to <container> and <contentInstance> resources.
|
118 114
|
oneM2M; LWM2M Interworking (oneM2M TS-0014 version 3.2.0 Release 3)
|
TS
|
3.2.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118114/03.02.00_60/ts_118114v030200p.pdf
|
The present document specifies the interworking capabilities of the M2M Service Layer between ASN/IN/MN CSEs and LWM2M Endpoints using the architecture identified in Annex F of ETSI TS 118 101 [2] for the following interworking scenarios: • Interworking for transparent transport of encoded LWM2M Objects and commands in Content Sharing Resources between LWM2M Endpoints and M2M Applications. • Interworking with full mapping of LWM2M Objects in LWM2M Endpoints to semantically enabled Content Sharing Resources that are utilized by M2M Applications. • Interworking with one-to-one mapping of LWM2M Objects with oneM2M <mgmtObj> resources NOTE: The present document limits Content Sharing Resources to <container> and <contentInstance> resources.
|
118 114
|
oneM2M; LWM2M Interworking (oneM2M TS-0014 version 2.0.1 Release 2A)
|
TS
|
2.0.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118114/02.00.01_60/ts_118114v020001p.pdf
|
The present document specifies the interworking capabilities of the M2M Service Layer between ASN/IN/MN CSEs and LWM2M Endpoints using the architecture identified in Annex F of ETSI TS 118 101 [2] for the following interworking scenarios: • Interworking for transparent transport of encoded LWM2M Objects and commands in Content Sharing Resources between LWM2M Endpoints and M2M Applications. • Interworking with full mapping of LWM2M Objects in LWM2M Endpoints to semantically enabled Content Sharing Resources that are utilized by M2M Applications. • Interworking with one-to-one mapping of LWM2M Objects with oneM2M <mgmtObj> resources NOTE: The present document limits Content Sharing Resources to <container> and <contentInstance> resources.
|
118 113
|
oneM2M; Interoperability Testing (oneM2M TS-0013 version 3.3.1 Release 3)
|
TS
|
3.3.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118113/03.03.01_60/ts_118113v030301p.pdf
|
The present document specifies Interoperability Test Descriptions (TDs) for the oneM2M Primitives as specified in ETSI TS 118 101 [1], oneM2M TS-0004 [2], the bindings ETSI TS 118 108 [3], ETSI TS 118 109 [4] and ETSI TS 118 110 [5].
|
118 122
|
oneM2M; Field Device Configuration (oneM2M TS-0022 version 3.0.2 Release 3)
|
TS
|
3.0.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118122/03.00.02_60/ts_118122v030002p.pdf
|
The present document specifies the architectural options, resources and procedures needed to pre-provision and maintain devices in the Field Domain (e.g. ADN, ASN/MN) in order to establish M2M Service Layer operation between the device's AE and/or CSE and a Registrar and/Hosting CSE. The resources and procedures includes information about the Registrar CSE and/or Hosting CSE needed by the AE or CSE to begin M2M Service Layer operation.
|
118 122
|
oneM2M; Field Device Configuration (oneM2M TS-0022 version 2.3.1 Release 2A)
|
TS
|
2.3.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118122/02.03.01_60/ts_118122v020301p.pdf
|
The present document specifies the architectural options, resources and procedures needed to pre-provision and maintain devices in the Field Domain (e.g. ADN, ASN/MN) in order to establish M2M Service Layer operation between the device's AE and/or CSE and a Registrar and/Hosting CSE. The resources and procedures includes information about the Registrar CSE and/or Hosting CSE needed by the AE or CSE to begin M2M Service Layer operation.
|
118 121
|
oneM2M; oneM2M and AllJoyn® Interworking (oneM2M TS-0021 version 2.0.1 Release 2A)
|
TS
|
2.0.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118121/02.00.01_60/ts_118121v020001p.pdf
|
The present document specifies the oneM2M and AllJoyn interworking technologies that enable AllJoyn Applications and oneM2M entities produce/consume services. Clause 5 defines the interworking architecture model that describes where the AllJoyn IPE is hosted and how the IPE is composed with. Clause 6 defines the architecture aspects that mainly describes AllJoyn services to oneM2M resource mapping structure and rules. Furthermore, this explains the IPE registration and AllJoyn service discovery by the IPE. Clause 7 defines the IPE interworking procedures that consists of the initial setup and the service interworking procedures.
|
118 120
|
oneM2M; WebSocket Protocol Binding (oneM2M TS-0020 version 3.0.1 Release 3)
|
TS
|
3.0.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118120/03.00.01_60/ts_118120v030001p.pdf
|
The present document specifies the binding of Mca and Mcc primitives onto the WebSocket binding. It specifies: • Procedures and message formats for operating and closing of WebSocket connections. • How request and response primitives are mapped into the payload of the WebSocket protocol.
|
118 120
|
oneM2M; WebSocket Protocol Binding (oneM2M TS-0020 version 2.1.2 Release 2A)
|
TS
|
2.1.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118120/02.01.02_60/ts_118120v020102p.pdf
|
The present document specifies the binding of Mca and Mcc primitives onto the WebSocket binding. It specifies: • Procedures and message formats for operating and closing of WebSocket connections. • How request and response primitives are mapped into the payload of the WebSocket protocol.
|
118 119
|
oneM2M Abstract Test Suite and Implementation eXtra Information for Test (oneM2M TS-0019 version 2.3.0 Release 2)
|
TS
|
2.3.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118119/02.03.00_60/ts_118119v020300p.pdf
|
The present document contains the Abstract Test Suite (ATS) for oneM2M as defined in ETSI TS 118 101 [1] and ETSI TS 118 104 [2] in compliance with the relevant requirements and in accordance with the relevant guidance given in ISO/IEC 9646-7 [5]. The objective of the present document is to provide a basis for conformance tests for oneM2M products giving a high probability of inter-operability between different manufacturers' equipment. The ISO standard for the methodology of conformance testing (ISO/IEC 9646-1 [3] and ISO/IEC 9646-2 [4]) as well as ETSI TS 118 115 [i.2] are used as a basis for the test methodology.
|
118 119
|
oneM2M Abstract Test Suite and Implementation eXtra Information for Test (oneM2M TS-0019 version 1.0.0)
|
TS
|
1.0.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118119/01.00.00_60/ts_118119v010000p.pdf
|
The present document contains the Abstract Test Suite (ATS) for oneM2M as defined in ETSI TS 118 101 [1] and ETSI TS 118 104 [2] in compliance with the relevant requirements and in accordance with the relevant guidance given in ISO/IEC 9646-7 [5]. The objective of the present document is to provide a basis for conformance tests for oneM2M products giving a high probability of inter-operability between different manufacturers' equipment. The ISO standard for the methodology of conformance testing (ISO/IEC 9646-1 [3] and ISO/IEC 9646-2 [4]) as well as ETSI TS 118 115 [i.2] are used as a basis for the test methodology.
|
118 110
|
oneM2M; MQTT Protocol Binding (oneM2M TS-0010 version 4.0.1 Release 4)
|
TS
|
4.0.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118110/04.00.01_60/ts_118110v040001p.pdf
|
The present document specifies the binding of Mca and Mcc primitives (message flows) onto the MQTT protocol. It specifies: 1) How a CSE or AE connects to MQTT. 2) How an Originator (CSE or AE) formulates a Request as an MQTT message, and transmits it to its intended Receiver. 3) How a Receiver listens for incoming Requests. 4) How that Receiver can formulate and transmit a Response.
|
118 110
|
oneM2M; MQTT Protocol Binding (oneM2M TS-0010 version 3.1.0 Release 3)
|
TS
|
3.1.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118110/03.01.00_60/ts_118110v030100p.pdf
|
The present document specifies the binding of Mca and Mcc primitives (message flows) onto the MQTT protocol. It specifies: 1) How a CSE or AE connects to MQTT. 2) How an Originator (CSE or AE) formulates a Request as an MQTT message, and transmits it to its intended Receiver. 3) How a Receiver listens for incoming Requests. 4) How that Receiver can formulate and transmit a Response.
|
118 110
|
oneM2M; MQTT Protocol Binding (oneM2M TS-0010 version 2.4.1 Release 2)
|
TS
|
2.4.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118110/02.04.01_60/ts_118110v020401p.pdf
|
The present document specifies the binding of Mca and Mcc primitives (message flows) onto the MQTT protocol. It specifies: 1) How a CSE or AE connects to MQTT. 2) How an Originator (CSE or AE) formulates a Request as an MQTT message, and transmits it to its intended Receiver. 3) How a Receiver listens for incoming Requests. 4) How that Receiver can formulate and transmit a Response.
|
118 110
|
oneM2M; MQTT Protocol Binding (oneM2M TS-0010 version 1.5.1 Release 1)
|
TS
|
1.1.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118110/01.01.00_60/ts_118110v010100p.pdf
|
The present document specifies the binding of Mca and Mcc primitives (message flows) onto the MQTT protocol. It specifies: 1) How a CSE or AE connects to MQTT. 2) How an Originator (CSE or AE) formulates a Request as an MQTT message, and transmits it to its intended Receiver. 3) How a Receiver listens for incoming Requests. 4) How that Receiver can formulate and transmit a Response.
|
118 109
|
oneM2M; HTTP Protocol Binding (oneM2M TS-0009 version 4.4.1 Release 4)
|
TS
|
4.4.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118109/04.04.01_60/ts_118109v040401p.pdf
|
The present document will cover the protocol specific part of communication protocol used by oneM2M compliant systems as RESTful HTTP binding. The scope of the present document is (not limited to as shown below): • Binding oneM2M Protocol primitive types to HTTP method. • Binding oneM2M response status codes (successful/unsuccessful) to HTTP response codes. • Binding oneM2M RESTful resources to HTTP resources. The present document is depending on Core Protocol specification (ETSI TS 118 104 [3]) for data types.
|
118 109
|
oneM2M; HTTP Protocol Binding (oneM2M TS-0009 version 3.5.0 Release 3)
|
TS
|
3.5.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118109/03.05.00_60/ts_118109v030500p.pdf
|
The present document will cover the protocol specific part of communication protocol used by oneM2M compliant systems as RESTful HTTP binding. The scope of the present document is (not limited to as shown below): • Binding oneM2M Protocol primitive types to HTTP method. • Binding oneM2M response status codes (successful/unsuccessful) to HTTP response codes. • Binding oneM2M RESTful resources to HTTP resources. The present document is depending on Core Protocol specification (ETSI TS 118 104 [3]) for data types.
|
118 109
|
oneM2M; HTTP Protocol Binding (oneM2M TS-0009 version 2.13.1 Release 2A)
|
TS
|
2.13.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118109/02.13.01_60/ts_118109v021301p.pdf
|
The present document will cover the protocol specific part of communication protocol used by oneM2M compliant systems as RESTful HTTP binding. The scope of the present document is (not limited to as shown below): • Binding oneM2M Protocol primitive types to HTTP method. • Binding oneM2M response status codes (successful/unsuccessful) to HTTP response codes. • Binding oneM2M RESTful resources to HTTP resources. The present document is depending on Core Protocol specification (ETSI TS 118 104 [3]) for data types.
|
118 109
|
oneM2M; HTTP Protocol Binding (oneM2M TS-0009 version 1.5.1 Release 1)
|
TS
|
1.1.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118109/01.01.00_60/ts_118109v010100p.pdf
|
The present document will cover the protocol specific part of communication protocol used by oneM2M compliant systems as RESTful HTTP binding. The scope of the present document is (not limited to as shown below): • Binding oneM2M Protocol primitive types to HTTP method. • Binding oneM2M response status codes (successful/unsuccessful) to HTTP response codes. • Binding oneM2M RESTful resources to HTTP resources. The present document is depending on Core Protocol specification (ETSI TS 118 104 [3]) for data types.
|
118 113
|
oneM2M; Interoperability Testing (oneM2M TS-0013 version 2.3.2 Release 2A)
|
TS
|
2.3.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118113/02.03.02_60/ts_118113v020302p.pdf
|
The present document specifies Interoperability Test Descriptions (TDs) for the oneM2M Primitives as specified in ETSI TS 118 101 [1], oneM2M TS-0004 [2], the bindings ETSI TS 118 108 [3], ETSI TS 118 109 [4] and ETSI TS 118 110 [5].
|
118 113
|
oneM2M; Interoperability Testing (oneM2M TS-0013 version 1.0.0 Release 1)
|
TS
|
1.0.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118113/01.00.00_60/ts_118113v010000p.pdf
|
The present document specifies Interoperability Test Descriptions (TDs) for the oneM2M Primitives as specified in ETSI TS 118 101 [1], oneM2M TS-0004 [2], the bindings ETSI TS 118 108 [3], ETSI TS 118 109 [4] and ETSI TS 118 110 [5].
|
118 112
|
oneM2M; Base Ontology (oneM2M TS-0012 version 3.7.3 Release 3)
|
TS
|
3.7.3
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118112/03.07.03_60/ts_118112v030703p.pdf
|
The present document contains the specification of the oneM2M Base Ontology. A formal OWL representation of the Base Ontology can be found at http://www.onem2m.org/ontology/Base_Ontology. The present document also specifies an instantiation of the Base Ontology in oneM2M resources which can be used for semantic annotation and for ontology based interworking [4]. Finally an example is given how external ontologies can be mapped to the Base Ontology. The example uses the Smart Appliances REFerence (SAREF) ontology (http://ontology.tno.nl/saref).
|
118 112
|
oneM2M; Base Ontology (oneM2M TS-0012 version 2.2.2 Release 2A)
|
TS
|
2.2.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118112/02.02.02_60/ts_118112v020202p.pdf
|
The present document contains the specification of the oneM2M Base Ontology. A formal OWL representation of the Base Ontology can be found at http://www.onem2m.org/ontology/Base_Ontology. The present document also specifies an instantiation of the Base Ontology in oneM2M resources which can be used for semantic annotation and for ontology based interworking [4]. Finally an example is given how external ontologies can be mapped to the Base Ontology. The example uses the Smart Appliances REFerence (SAREF) ontology (http://ontology.tno.nl/saref).
|
118 111
|
oneM2M; Common Terminology (oneM2M TS-0011 version 4.1.1 Release 4)
|
TS
|
4.1.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118111/04.01.01_60/ts_118111v040101p.pdf
|
The present document contains a collection of specialist technical terms, definitions and abbreviations referenced within the oneM2M specifications. Having a common collection of definitions and abbreviations related to oneM2M documents will: • ensure that the terminology is used in a consistent manner across oneM2M documents; • provide a reader with convenient reference for technical terms that are used across multiple documents. The present document provides a tool for further work on oneM2M technical documentation and facilitates their understanding. The definitions and abbreviations as given in the present document are either externally created and included here, or created internally within oneM2M by the oneM2M TP or its working groups, whenever the need for precise vocabulary is identified or imported from existing documentation. In addition in oneM2M Technical Specifications and Technical Reports there are also clauses dedicated for locally unique definitions and abbreviations.
|
118 103
|
oneM2M; Security solutions (oneM2M TS-0003 version 2.12.1 Release 2A)
|
TS
|
2.12.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118103/02.12.01_60/ts_118103v021201p.pdf
|
The present document defines security solutions applicable within the M2M system.
|
118 111
|
oneM2M Common Terminology
|
TS
|
1.0.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118111/01.00.00_60/ts_118111v010000p.pdf
|
The present document contains a collection of specialist technical terms, definitions and abbreviations referenced within the oneM2M specifications. Having a common collection of definitions and abbreviations related to oneM2M documents will: • ensure that the terminology is used in a consistent manner across oneM2M documents; • provide a reader with convenient reference for technical terms that are used across multiple documents. The present document provides a tool for further work on oneM2M technical documentation and facilitates their understanding. The definitions and abbreviations as given in the present document are either externally created and included here, or created internally within oneM2M by the oneM2M TP or its working groups, whenever the need for precise vocabulary is identified or imported from existing documentation. In addition in oneM2M Technical Specifications and Technical Reports there are also clauses dedicated for locally unique definitions and abbreviations.
|
118 108
|
oneM2M; CoAP Protocol Binding (oneM2M TS-0008 version 4.4.1 Release 4)
|
TS
|
4.4.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118108/04.04.01_60/ts_118108v040401p.pdf
|
The present document will cover the protocol specific part of communication protocol used by oneM2M compliant systems as 'RESTful CoAP binding'. The scope of the present document is (not limited to as shown below): • Binding oneM2M primitives to CoAP messages. • Binding oneM2M Response Status Codes to CoAP Response Codes. • Defining behaviour of a CoAP Client and Server depending on oneM2M parameters.
|
118 108
|
oneM2M; CoAP Protocol Binding (oneM2M TS-0008 version 3.6.0 Release 3)
|
TS
|
3.6.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118108/03.06.00_60/ts_118108v030600p.pdf
|
The present document will cover the protocol specific part of communication protocol used by oneM2M compliant systems as 'RESTful CoAP binding'. The scope of the present document is (not limited to as shown below): • Binding oneM2M primitives to CoAP messages. • Binding oneM2M Response Status Codes to CoAP Response Codes. • Defining behaviour of a CoAP Client and Server depending on oneM2M parameters.
|
118 102
|
oneM2M; Requirements (oneM2M TS-0002 version 2.10.2 Release 2A)
|
TS
|
2.10.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118102/02.10.02_60/ts_118102v021002p.pdf
|
The present document contains an informative functional role model and normative technical requirements for oneM2M.
|
118 102
|
oneM2M Requirements
|
TS
|
1.0.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118102/01.00.00_60/ts_118102v010000p.pdf
|
The present document contains an informative functional role model and normative technical requirements for oneM2M.
|
118 101
|
oneM2M; Functional Architecture (oneM2M TS-0001 version 4.15.0 Release 4)
|
TS
|
4.15.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118101/04.15.00_60/ts_118101v041500p.pdf
|
The present document describes the end-to-end oneM2M functional architecture, including the description of the functional entities and associated reference points. oneM2M functional architecture focuses on the Service Layer aspects and takes Underlying Network-independent view of the end-to-end services. The Underlying Network is used for the transport of data and potentially for other services.
|
118 103
|
<empty>
|
TS
|
3.13.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118103/03.13.00_60/ts_118103v031300p.pdf
|
The present document defines security solutions applicable within the M2M system.
|
118 106
|
oneM2M; Management Enablement (BBF) (oneM2M TS-0006 version 1.1.4 Release 1)
|
TS
|
1.1.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118106/01.01.00_60/ts_118106v010100p.pdf
|
The present document describes the protocol mappings between the management Resources for oneM2M and the BBF TR-181 [6].
|
118 103
|
oneM2M; Security solutions (oneM2M TS-0003 version 1.4.2 Release 1)
|
TS
|
1.1.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118103/01.01.00_60/ts_118103v010100p.pdf
|
The present document defines security solutions applicable within the M2M system.
|
118 105
|
oneM2M; Management Enablement (OMA) (oneM2M TS-0005 version 3.5.1 Release 3)
|
TS
|
3.5.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118105/03.05.01_60/ts_118105v030501p.pdf
|
The present document specifies the protocol translation and mappings between the oneM2M Service layer and the management technologies specified by OMA such as OMA DM 1.3 [3], OMA DM 2.0 [4] and OMA LightweightM2M. Note that OMA DM 1.3 [3] and OMA DM 2.0 [4] are collectively referenced as OMA DM in the present document.
|
118 102
|
<empty>
|
TS
|
3.1.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118102/03.01.02_60/ts_118102v030102p.pdf
|
The present document contains an informative functional role model and normative technical requirements for oneM2M.
|
118 105
|
oneM2M; Management Enablement (OMA) (oneM2M TS-0005 version 1.4.1 Release 1)
|
TS
|
1.1.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118105/01.01.00_60/ts_118105v010100p.pdf
|
The present document specifies the protocol translation and mappings between the oneM2M Service layer and the management technologies specified by OMA such as OMA DM 1.3 [3], OMA DM 2.0 [4] and OMA LightweightM2M. Note that OMA DM 1.3 [3] and OMA DM 2.0 [4] are collectively referenced as OMA DM in the present document.
|
118 106
|
oneM2M; Management Enablement (BBF) (oneM2M TS-0006 version 3.6.2 Release 3)
|
TS
|
3.6.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118106/03.06.02_60/ts_118106v030602p.pdf
|
The present document describes the protocol mappings between the management Resources for oneM2M and the BBF TR-181 [6].
|
118 106
|
oneM2M; Management Enablement (BBF) (oneM2M TS-0006 version 2.2.1 Release 2A)
|
TS
|
2.2.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118106/02.02.01_60/ts_118106v020201p.pdf
|
The present document describes the protocol mappings between the management Resources for oneM2M and the BBF TR-181 [6].
|
118 104
|
oneM2M; Service Layer Core Protocol Specification (oneM2M TS-0004 version 2.7.1 Release 2)
|
TS
|
2.7.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118104/02.07.01_60/ts_118104v020701p.pdf
|
The present document specifies the communication protocol(s) for oneM2M compliant Systems, M2M Applications, and/or other M2M systems. The present document also specifies the common data formats, interfaces and message sequences to support reference points(s) defined by oneM2M.
|
118 111
|
oneM2M; Common Terminology (oneM2M TS-0011 version 2.4.1 Release 2)
|
TS
|
2.4.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118111/02.04.01_60/ts_118111v020401p.pdf
|
The present document contains a collection of specialist technical terms, definitions and abbreviations referenced within the oneM2M specifications. Having a common collection of definitions and abbreviations related to oneM2M documents will: • ensure that the terminology is used in a consistent manner across oneM2M documents; • provide a reader with convenient reference for technical terms that are used across multiple documents. The present document provides a tool for further work on oneM2M technical documentation and facilitates their understanding. The definitions and abbreviations as given in the present document are either externally created and included here, or created internally within oneM2M by the oneM2M TP or its working groups, whenever the need for precise vocabulary is identified or imported from existing documentation. In addition in oneM2M Technical Specifications and Technical Reports there are also clauses dedicated for locally unique definitions and abbreviations.
|
118 101
|
oneM2M; Functional Architecture (oneM2M TS-0001 version 1.13.1 Release 1)
|
TS
|
1.1.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118101/01.01.00_60/ts_118101v010100p.pdf
|
The present document describes the end-to-end oneM2M functional architecture, including the description of the functional entities and associated reference points. oneM2M functional architecture focuses on the Service Layer aspects and takes Underlying Network-independent view of the end-to-end services. The Underlying Network is used for the transport of data and potentially for other services.
|
118 105
|
oneM2M; Management Enablement (OMA) (oneM2M TS-0005 version 2.0.2 Release 2A)
|
TS
|
2.0.2
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118105/02.00.02_60/ts_118105v020002p.pdf
|
The present document specifies the protocol translation and mappings between the oneM2M Service layer and the management technologies specified by OMA such as OMA DM 1.3 [3], OMA DM 2.0 [4] and OMA LightweightM2M. Note that OMA DM 1.3 [3] and OMA DM 2.0 [4] are collectively referenced as OMA DM in the present document.
|
110 174-2-1
|
Access, Terminals, Transmission and Multiplexing (ATTM); Sustainable Digital Multiservice Cities; Broadband Deployment and Energy Management; Part 2: Multiservice Networking Infrastructure and Associated Street Furniture; Sub-part 1: General requirements
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/110100_110199/1101740201/01.01.01_60/ts_1101740201v010101p.pdf
|
The present document details measures which may be taken to ease the deployment of smart new services and their multiservice street furniture of digital multiservice city within the IP network of a single city or an association of cities administratively clustered. Furthermore, the suggested measures will enable to engineer a reliable common networking infrastructure which can improve the Total Cost of Ownership (TCO) for the public administration while improving the energy efficiency of the overall deployment. The present document also lists the requirements which have led to this common architecture. Clause 4 presents a suggestion of an engineered digital multiservice city. Clause 5 introduces the active role categorized urban assets can play in the delivery of digital services across the territory of the city. Clause 6 reviews the spread efforts within the standardization organizations for the digital multiservice city. Clause 7 suggests both the common engineering required to transform an urban asset into an active network nodes of the digital multiservice city while presenting a concrete illustration of network design for one of the categories. This will enable the proper introduction and implementation of a new service, application or content within the city digital portfolio on a unified energy efficient network, though it is not the goal of the present document to provide detailed standardized solutions for network architecture.
|
110 174-1
|
Access, Terminals, Transmission and Multiplexing (ATTM); Sustainable Digital Multiservice Cities (SDMC); Broadband Deployment and Energy Management; Part 1: Overview, common and generic aspects of societal and technical pillars for sustainability
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/110100_110199/11017401/01.01.01_60/ts_11017401v010101p.pdf
|
The present document introduces the common and generic aspects of the societal and technical pillars to achieve sustainability objectives behind the deployment of smart new services within the IP network of a single city or an association of cities administratively clustered. Clause 4 identifies and presents a general overview of a city from small entity to significantly large municipality clustering several cities and villages. Clause 5 presents the pursued objectives behind the concept of smart city. Clause 6 describes the general theoretical pillars which bear the engineering requirements to deploy a digital multi service city. Clause 7 identifies the general needs from the cities.
|
105 388
|
Transmission and Multiplexing (TM); Access transmission systems on metallic access cables; Asymmetric Digital Subscriber Line (ADSL2plus) - European specific requirements [ITU-T Recommendation G.992.5 modified]
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/105300_105399/105388/01.01.01_60/ts_105388v010101p.pdf
|
The present document specifies European requirements for ADSL2plus. The present document endorses ITU-T Recommendation G.992.5 [1] and amendments 1 [2], 2 [3] and 3 [4], the contents of which apply together with the addition of the modifications being covered herein, to the exclusion of annex C of G.992.5. In particular the aspects covered by the present document are related to: 1) Define INP values as mandatory. 2) Define specific European tests. 3) Define mandatory S&D values. 4) Define mandatory support of extended interleaving memory.
|
105 200-3-1
|
Access, Terminals, Transmission and Multiplexing (ATTM); Energy management; Operational infrastructures; Implementation of Global KPIs; Part 3: ICT Sites; Sub-part 1: DCEM
|
TS
|
1.2.1
|
http://www.etsi.org/deliver/etsi_ts/105200_105299/1052000301/01.02.01_60/ts_1052000301v010201p.pdf
|
The reporting of Global KPIs in accordance with ETSI EN 305 200-3-1 [2] requires the collection of data to enable the calculation of the following aspects: • objective KPI relating to the total energy consumption (KPIEC); • objective KPI relating to the use of energy performance (KPIEP) which combines KPIEC with other measurements of energy consumption to provide Objective KPIs related to task efficiency (KPITE), the reuse of energy (KPIREUSE) and the use of renewable energy (KPIREN). The present document supports the requirements of ETSI EN 305 200-3-1 [2] providing a framework for, and detailing, the implementation procedures including any necessary techniques for estimation of energy consumption together with constants to be employed for weighting and banding purposes.
|
105 200-2-3
|
Access, Terminals, Transmission and Multiplexing (ATTM); Energy management; Operational infrastructures; Implementation of Global KPIs; Part 2: Specific requirements; Sub-part 3: Mobile broadband access networks
|
TS
|
1.2.1
|
http://www.etsi.org/deliver/etsi_ts/105200_105299/1052000203/01.02.01_60/ts_1052000203v010201p.pdf
|
The reporting of Global KPIs in accordance with ETSI EN 305 200-2-3 [2] requires the collection of data to enable the calculation of the following aspects: • Objective KPI relating to task efficiency (KPITE) based on data_volume and total energy consumption (KPIEC). • Objective KPI relating to the use of renewable energy (KPIREN). The present document supports the requirements of ETSI EN 305 200-2-3 [2] providing a framework for, and detailing, the implementation procedures including any necessary techniques for estimation of energy consumption together with clarification and treatment of different types of data volume.
|
118 104
|
oneM2M; Service Layer Core Protocol Specification (oneM2M TS-0004 version 1.6.0 Release 1)
|
TS
|
1.1.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118104/01.01.00_60/ts_118104v010100p.pdf
|
The present document specifies the communication protocol(s) for oneM2M compliant Systems, M2M Applications, and/or other M2M systems. The present document also specifies the common data formats, interfaces and message sequences to support reference points(s) defined by oneM2M.
|
105 174-5-1
|
Access, Terminals, Transmission and Multiplexing (ATTM); Broadband Deployment and Lifecycle Resource Management; Part 5: Customer network infrastructures; Sub-part 1: Homes (single-tenant)
|
TS
|
1.4.1
|
http://www.etsi.org/deliver/etsi_ts/105100_105199/1051740501/01.04.01_60/ts_1051740501v010401p.pdf
|
The present document details measures which may be taken to improve the energy efficiency within homes (single-tenant) by virtue of broadband deployment. Clauses 2 and 3 contain references, definitions of terms and abbreviations which relate to this part; similar information will be included in the corresponding clauses of the other parts, thus ensuring that each document can be used on a "stand-alone" basis. Within the present document: • clause 4 describes the nature of customer premises networks in homes (single tenant), defines the interfaces to those networks and identifies the standardization bodies working on the design and installation of those networks; • clause 5 describes the strategies that may be employed within homes (single tenant) to both increase the energy efficiency of installed information technology equipment and to use the facilities offered by information technology services to reduce overall energy consumption. This will enable the proper implementation of services, applications and content on an energy efficient infrastructure, though it is not the goal of this multi-part deliverable to provide detailed standardized solutions for home broadband network architecture.
|
105 175-1-2
|
Access, Terminals, Transmission and Multiplexing (ATTM); Plastic Optical Fibres; Part 1: Plastic Optical Fibre System Specifications for 100 Mbit/s and 1 Gbit/s; Sub-part 2: 1 Gbit/s and 100 Mbit/s physical layer for Plastic Optical Fibres
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/105100_105199/1051750102/01.01.01_60/ts_1051750102v010101p.pdf
|
The present document provides a description of an OSI physical networking layer to communicate data over plastic optical fibre at 100 Mbit/s and 1 000 Mbit/s. A full duplex physical layer is described. Multi data type interface is proposed, as well as its encapsulation, coding and modulation needed to achieve 1 Gbit/s link over a bandwidth limited optical channel like the plastic optical fibre. Multiple link speeds are handled by this physical layer.
|
118 108
|
oneM2M; CoAP Protocol Binding (oneM2M TS-0008 version 2.6.1 Release 2A)
|
TS
|
2.6.1
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118108/02.06.01_60/ts_118108v020601p.pdf
|
The present document will cover the protocol specific part of communication protocol used by oneM2M compliant systems as 'RESTful CoAP binding'. The scope of the present document is (not limited to as shown below): • Binding oneM2M primitives to CoAP messages. • Binding oneM2M Response Status Codes to CoAP Response Codes. • Defining behaviour of a CoAP Client and Server depending on oneM2M parameters.
|
118 101
|
<empty>
|
TS
|
3.22.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118101/03.22.00_60/ts_118101v032200p.pdf
|
The present document describes the end-to-end oneM2M functional architecture, including the description of the functional entities and associated reference points. oneM2M functional architecture focuses on the Service Layer aspects and takes Underlying Network-independent view of the end-to-end services. The Underlying Network is used for the transport of data and potentially for other services.
|
118 108
|
oneM2M; CoAP Protocol Binding (oneM2M TS-0008 version 1.3.2 Release 1)
|
TS
|
1.1.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118108/01.01.00_60/ts_118108v010100p.pdf
|
The present document will cover the protocol specific part of communication protocol used by oneM2M compliant systems as 'RESTful CoAP binding'. The scope of the present document is (not limited to as shown below): • Binding oneM2M primitives to CoAP messages. • Binding oneM2M Response Status Codes to CoAP Response Codes. • Defining behaviour of a CoAP Client and Server depending on oneM2M parameters.
|
118 101
|
oneM2M; Functional Architecture (oneM2M TS-0001 version 2.10.0 Release 2)
|
TS
|
2.10.0
|
http://www.etsi.org/deliver/etsi_ts/118100_118199/118101/02.10.00_60/ts_118101v021000p.pdf
|
The present document describes the end-to-end oneM2M functional architecture, including the description of the functional entities and associated reference points. oneM2M functional architecture focuses on the Service Layer aspects and takes Underlying Network-independent view of the end-to-end services. The Underlying Network is used for the transport of data and potentially for other services.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.