Standardi

IEEE 3130-2024

Julkaistu

Lisää mahdolliset korjaukset ja lisäykset ostoskoriin alta. Hintoihin lisätään kulloinkin voimassa oleva arvonlisävero.

Kieli
Toimitustavat

Soveltamisala

New IEEE Standard - Active. The main assets and threats targeting operating systems used in connected vehicles are identified. The security requirements of the operating systems to support the core security functions in connected vehicles are defined. A set of test methods is established to evaluate the security of operating systems in connected vehicles.

Julkaisun tiedot

  • Standardi julkaisijalta IEEE
  • Julkaistu:
  • Julkaisutyyppi: IS
  • Julkaisija IEEE
  • Jakelija IEEE
  • ICS 35.240.60
  • Tekninen komitea IEEE Vehicular Technology Society / Intelligent Transportation Systems

Sidokset

  • Enums.Sd.Shared.Models.ProductRelationType.REFERS: ISO/IEC 11770-2, IT Security techniques--Key management---Part 2: Mechanisms using symmetric techniques.
  • Enums.Sd.Shared.Models.ProductRelationType.REFERS: ISO/IEC 18033-2, Information technology--Security techniques--Encryption algorithms--Part 2: Asymmetric ciphers.
  • Enums.Sd.Shared.Models.ProductRelationType.REFERS: ISO/IEC 18033-1, Information security--Encryption algorithms--Part 1: General.
  • Enums.Sd.Shared.Models.ProductRelationType.REFERS: ISO/IEC 14888-1, Information technology--Security techniques--Digital signatures with appendix--Part 1: General.
  • Enums.Sd.Shared.Models.ProductRelationType.REFERS: ISO/IEC 18033-3, Information technology--Security techniques--Encryption algorithms--Part 3: Block ciphers.
  • Enums.Sd.Shared.Models.ProductRelationType.REFERS: ISO/IEC 10118-1, Information technology--Security techniques--Hash-functions--Part 1: General.
  • Enums.Sd.Shared.Models.ProductRelationType.REFERS: ISO/IEC 11770-3, IT Security techniques--Key management--Part 3: Mechanisms using asymmetric techniques.