ISO IEC 29180 CORR 1-2015 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networ.pdf
《ISO IEC 29180 CORR 1-2015 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networ.pdf》由会员分享,可在线阅读,更多相关《ISO IEC 29180 CORR 1-2015 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networ.pdf(2页珍藏版)》请在麦多课文档分享上搜索。
1、ISO/IEC 29180:2012/Cor.1:2015 (E) Rec. ITU-T X.1311 (2011)/Cor.1 (11/2014) 1 INTERNATIONAL STANDARD ITU-T RECOMMENDATION Information technology Security framework for ubiquitous sensor networks Technical Corrigendum 1 Conventions used in this corrigendum: Original, unchanged, text is in normal font.
2、 Deleted text is struck-through, thus: deleted text. Inserted text is underlined, thus: inserted text. 1 Clause 2.2 Modify clause 2.2 as follows: 2.2 Paired Recommendations | International Standards equivalent in technical content Recommendation ITU-T X.800 (1991), Security architecture for Open Sys
3、tems Interconnection for CCITT applications. ISO/IEC 7498-2:1989, Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture. Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-end communications. ISO/IEC 18028-2
4、:2006, Information technology Security techniques IT network security Part 2: Network security architecture. 2 Clause 2.3 Add the following reference to clause 2.3: Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-end communications. 3 Clause 6 Modify the 10th pa
5、ragraph as follows: There are three components in the SN: the application server communicating with the sink node; the sink node called the base station, which interfaces the sensor network and the application server, and the collection of sensor nodes using wireless communication to communicate wit
6、h each other. The sink may communicate with the application server via the Internet or a satellite. Security architecture in the IP-based network is very similar to that in Rec. ITU-T X.805 | ISO/IEC 18028-2. Therefore, this Recommendation | International Standard focuses on the security of the wire
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOIEC29180CORR12015INFORMATIONTECHNOLOGYTELECOMMUNICATIONSANDINFORMATIONEXCHANGEBETWEENSYSTEMSSECURITYFRAMEWORKFORUBIQUITOUSSENSORNETWORPDF

链接地址:http://www.mydoc123.com/p-1257182.html