This project addresses the necessary revision of two withdrawn American National Standards (X9.57 and X9.55) and the unacceptability of an international standard (ISO 15782) into an existing American National Standard (X9.79). X9.57-1997 Certificate Management was internationalized as ISO 15782 Certificate management for financial services Part 1: Public key certificates; however the X9F4 working group has determined that the USA cannot adopt ISO 15782-1 due to the numerous inconsistencies with USA practices including the removal of certificate revocations.
定价: 546元 / 折扣价: 465 元 加购物车
In the current state of the art in public key cryptography, all methods require, in one way or another, the use of prime numbers as parameters to the various algorithms. This document presents a set of accepted techniques for generating primes. It is intended that ASC X9 standards that require the use of primes will refer to this document, rather than trying to define these techniques on a case-by-case basis. Standards, as they exist today, may differ in the methods they use for parameter generation from those specified in this document. It is anticipated that as each existing ASC X9 standard comes up for its 5-year review, it will be modified to reference this document instead of specifying its own techniques for generating primes. This standard defines methods for generating large prime numbers as needed by public key cryptographic algorithms. It also provides testing methods for testing candidate primes presented by a third party. This standard allows primes to be generated either deterministically or probabilistically, where: - A number shall be accepted as prime when a probabilistic algorithm that declares it to be prime is in error with probability less than 2?00. - A deterministic prime shall be generated using a method that guarantees that it is prime. In addition to algorithms for generating primes, this standard also presents primality certificates for some of the algorithms where it is feasible to do so. The syntax for such certificates is beyond the scope of this document. Primality certificates are never required by this standard. Primality certificates are not needed when a prime is generated and kept in a secure environment that is managed by the party that generated the prime.
定价: 910元 / 折扣价: 774 元 加购物车
This standard specifies the minimum security requirements for the effective use of time stamps in a financial services environment. Within the scope of this Standard the following topics are addressed: - Requirements for the secure management of the time stamp token across its life cycle, comprised of the generation, transmission and storage, validation, and renewal processes. The requirements in this Standard identify the means to securely and verifiably distribute time from a national time source down to the application level; - Requirements for the secure management of a Time Stamp Authority (TSA); - Requirements of a TSA to ensure that an independent third party can audit and validate the controls over the use of a time stamp process; - Techniques for the coding, encapsulation, transmission, storage, integrity and privacy protection of time stamp data; - Usage of time stamp technology.
定价: 910元 / 折扣价: 774 元 加购物车
Describes in detail the basic Fibre Channel services introduced in American National Standard for Information Technology - Fibre Channel - Physical and Signaling Interface (FC-PH), ANSI X3.230-1994. In addition, this document describes any ancillary functions and services required to support the Fibre Channel services. Services described include name services, time services, alias services, SNMP services, and security key distribution. This standard replaces ANSI X3.288-1996.
定价: 570元 / 折扣价: 485 元 加购物车
100-SM-LC-L describes an enhancement to American National Standard for Information Technology - Fibre Channel - Physical and Signaling Interface (FC-PH), ANSI X3.230-1994, to American National Standard for Information Technology - Fibre Channel - Physical and Signalling Interface-2 (FC-PH-2) ANSI X3.297-1997, and to American National Standard for Information Technology - Fibre Channel - Physical and Signalling Interface-3 (FC-PH-3), ANSI X3.303-1998, and is an addendum to the FC-PH, FC-PH-2, and FC-PH-3 documents. This document is an extension to the FC-PH, FC-PH-2, and FC-PH-3 standards and describes a low-cost 10-km optical interface.
定价: 570元 / 折扣价: 485 元 加购物车
Defines the mechanical, electrical, timing, and protocol requirements of the SCSI parallel interface to allow conforming SCSI devices to inter-operate. The SCSI parallel interface is a local I/O bus that may be operated over a wide range of transfer rates. This standard was originally listed for public review in the March 10, 2000 issue of Standards Action. It is being resubmitted due to substantive changes to the text.
定价: 570元 / 折扣价: 485 元 加购物车
Describes a communication interface between a channel and I/O control units that utilize the Single-Byte Command Code Sets (SBCCS) as implemented in a wide range of data processing systems. It employs information formats and signaling protocols that provide a uniform means for communicating with various types of I/O control units, facilitating a high bandwidth, high performance, and long distance information exchange environment. The signaling protocols and information ex-changes are defined at a layer (FC-4) to compatibly utilize the link services and other functions pro-vided by the ANSI Fibre Channel Physical and Signaling Interface (FC-PH) architecture (ANSI X3.230- 1994, reference [1]). This FC-4 Upper Level Protocol is referred to as the Fibre Channel-Single-Byte-2 Command Code Sets Mapping Protocol (or for brevity, SB-2).
定价: 570元 / 折扣价: 485 元 加购物车
Defines the SCSI commands that are mandatory and optional for all SCSI devices. This standard also defines the SCSI commands that may apply to any device model. The set of SCSI standards specifies the interfaces, functions, and operations necessary to ensure interoperability between conforming SCSI implementations. This standard is a functional description. Conforming implementations may employ any design technique that does not violate interoperability.
定价: 570元 / 折扣价: 485 元 加购物车
Facilitates incorporation of usability as part of the procurement decision- making process for interactive software products. Examples of such decisions include purchasing, upgrading and automating. It provides a common format for human factors engineers and usability professionals in supplier companies to report the methods and results of usability tests to customer organizations.
定价: 570元 / 折扣价: 485 元 加购物车
Describes the operation and interaction of Fibre Channel Switches. This standard includes: (a) E_Port Operation and Fabric Configuration; (b) Path selection (FSPF and FSPF-Backbone); (c) Bridge Port (B_Port) Operation; (d) Distributed server interaction and communication; (e) Exchange of information between Switches to support zoning; and (f) Distribution of Event Notifications between Switches.
定价: 570元 / 折扣价: 485 元 加购物车
This Standard specifies a concept and data format for representation of fingerprints using the fundamental notion of minutiae. The data format is generic, in that it may be applied and used in a wide range of application areas where automated fingerprint recognition is involved. No application-specific requirements or features are addressed in this standard. The Standard contains definitions of relevant terms, a description of where minutiae shall be defined, a data format for containing the data, and conformance information. This standard is superseded by INCITS 378-2009.
定价: 570元 / 折扣价: 485 元 加购物车
This standard defines the command set extensions to control operation of Object-Based Storage devices. The clause(s) of this standard pertaining to the SCSI Object-Based Storage Device class, implemented in conjunction with the applicable clauses of the ISO/IEC 14776-453 SCSI Primary Commands -3 (SPC-3), specify the standard command set for SCSI Object-Based Storage devices.
定价: 570元 / 折扣价: 485 元 加购物车
In today苨 world, both private and public sectors depend upon information technology systems to perform essential and mission-critical functions. In the current environment of increasingly open and interconnected systems and networks, network and data security are essential for the effective use of information technology. Privacy and regulatory requirements highlight this need. For example, systems that perform electronic commerce must protect against unauthorized access to confidential records and unauthorized modification of data. Wireless technologies are rapidly emerging as significant components of these networks. As such, data classification and risk assessments should be performed to determine the sensitivity of, and risk to, data transmitted over wireless networks. Various methods and controls should be considered for data that is sensitive, has a high value, or represents a high value if it is vulnerable to unauthorized disclosure or undetected modification during transmission over wireless networks. These methods and controls support communications security, for example by encrypting the communication prior to transmission and decrypting it at receipt. Note that data classification and risk assessments, regardless of whether data transmission is over wired or wireless environments, should be part of an organization苨 general security policy and best practices. Refer to Annex A Wireless Validation Control Objectives for further details. Part 1 of this Standard provides an overview of wireless radio frequency (RF) technologies and general requirements applicable to all wireless implementations for the financial services industry. Subsequent parts of this Standard will address specific applications to wireless technology and associated risks, as well as technologies, methods and controls that mitigate those risks. Note that other wireless non-radio frequency technologies, such as infrared and lasers are considered out of scope of this Standard. For the purposes of this Standard the use of the terms 魋hall?and 鬽ust?are requirements and therefore mandatory, whereas 魋hould?is a recommendation. Refer to Annex B Wireless Technology for examples.
定价: 910元 / 折扣价: 774 元 加购物车
The financial services industry relies on several time-honored methods of electronically identifying, authorizing, and authenticating entities and protecting financial transactions. This standard defines a taxonomy, requirements, operating principles, controls objectives, techniques, and technical approaches to enable financial institutions (FI) and financial services to support secure remote access.
定价: 910元 / 折扣价: 774 元 加购物车