This standard is for a Protection Profile for Hardcopy Devices in a restrictive commercial information processing environment in which a relatively high level of document security, operational accountability, and information assurance are required. The typical information processed in this environment is trade secret, mission critical, or subject to legal and regulatory considerations, such as for privacy or governance. This environment is not intended to support life-critical or national… read more security applications. This environment will be known as "Operational Environment A." read less
This guide provides Definitions of the concepts of application portability, application interoperability, data portability, and user portabilityDescriptions of services needed in the areas of application portability, application interoperability, data portability, and user portabilityA survey of existing standards that address these objectivesIdentification of those areas where formal standards do not exist and discussion of near-term strategies for filling these gapsGuidance on assembling… read more these standards into profiles This guide includes no mandatory requirements. read less
The purpose of this guide is to describe the electromagnetic threat posed to electronic equipment and subassemblies by actual Electrostatic Discharge (ESD) events from humans and mobile furnishings. This guide organizes existing data on the subject of ESD in order to characterize the ESD surge environment. This guide is not an ESD test standard. An appropriate ESD test standard should be selected for equipment testing ([1], [3], ). The manufacturing, handling, packaging, and transportation of… read more individual electronic components, including integrated circuits, are not discussed, and this guide does not deal with mobile items such as automobiles, aircraft, or other masses of comparable size. ESD results in a sudden transfer of charge between bodies of differing electrostatic potentials. In this guide, the term ESD includes charge transfer whether or not an arc occurs or is perceived. ESD phenomena generate electromagnetic fields over a broad range of frequencies, from direct current (dc) to low gigahertz. The term ESD event includes not only the discharge current, but also the electromagnetic fields and corona effects before and during a discharge. In this guide the intruder is often a human, but it may be any object that is moved, such as a chair, an equipment cart, a vacuum cleaner, or the equipment victim itself, whether or not it is in conductive contact with a human. The equipment victim is usually a fabricated electronic equipment or subassembly and is generally, although not necessarily, at local electrostatic ground potential. The equipment victim may be the receptor to which the discharge takes place from the intruder; less frequently, the equipment victim may be the intruder. Alternatively, the equipment victim may be affected by the electromagnetic fields generated by a discharge between an intruder and a receptor. Receptors and intruders that may not themselves be equipment victims include furniture such as metal chairs, carts, tables and file cabinets, as well as other electronic equipment. This guide discusses and cites references that describe the ways in which a body builds up charge and the characteristics of discharge currents and fields. Descriptions and references are also given for electrical equivalent circuits to be used in understanding and simulating the discharge current between intruder and receptor masses. Publications that are specifically referenced in the text of the guide are listed in the Section , while Section cites additional publications in both ESD and related areas. Most of the work that has been published in connection with actual ESD is related to discharges from humans, usually grasping or in association with a metal object. Far less published data exists for discharges from humans without metal objects, and from mobile furnishings, and virtually no data exists for discharges from human torsos or clothing. For this reason, primary emphasis is placed on discharges from humans with associated metal objects, with some additional material relating to ESDs from mobile furnishings. All discharges are assumed to take place in an air environment. Finally, all of the published time-domain data on which this guide relies were taken using instrumentation with either a 400 MHz or a 1 GHz bandwidth. read less
This standard specifies a framework of TEE-based secure computing systems, and defines the corresponding requirements in terms of isolation, confidentiality, compatibility, performance, usability, and security. It is applicable to guide the design, development, testing, and maintenance of TEE-based secure computing systems.
To describe a process for developing user Open Environment (OSE) profiles, as opposed to standardized profiles. The guide shall include a framework for documenting user requirements, related information technology services, a transition plan, conformance testing and consideration planning considerations, and examples of user organization OSE profiles.
This guide identifies factors that should be considered in accelerated aging programs and is intended to be supportive of the aging requirements called for in IEEE Std 323-1983 and its subsidiary standards. This guide presents methodologies for conducting accelerated aging tests in which factors of synergistic interactions, radiation dose-rate effects, oxygen diffusion rates, etc., need to be considered. This guide does not define specific requirements for appropriate radiation exposure sources,… read more selection of specific levels of thermal or radiation exposure, or specific properties to be monitored; nor does it make recommendations for sequencing or combining aging stresses for particular materials or circumstances. For such guidance, one should employ the general guidelines herein, supplemented by considerations of the specific equipment and environment, together with prior experience or the experience of others who have published data on the aging of materials closely related to those in question. read less
This standard defines a framework and architectures for machine learning in which a model is trained using encrypted data that has been aggregated from multiple sources and is processed by a third party trusted execution environment (TEE). A distinctive feature of this technique is the essential use of a third-party TEE for computations. The standard specifies functional components, workflows, security requirements, technicalrequirements, and protocols.

我的标准
购物车
400-168-0010




对不起,暂未有相关搜索结果!










