Project acronym: TraSer. Duration: 36 months. System Architecture
|
|
- Andrea Kelley
- 6 years ago
- Views:
Transcription
1 Project acronym: Project title: Identity-Based Tracking and Web-Services for SMEs Start date of project: Sixth Framework Programme IST Call 5 Fp IST-5 ICT for Networked Businesses Priority 2 Specific Targeted Research Project Duration: 36 months System Architecture Document Date : 28 th of August 2007 Organisation and authors Abstract : RUG: Fred van Blommestein, TNO: Bram van der Waaij and Erik Langius HUT: Teppo Tossavainen SZTAKI: Marcell Szathmári : This document describes the system architecture: the components, their functions and the protocols of communication between the components. RUG: University of Groningen TNO: Netherlands Organization for Applied Scientific Research HUT: Helsinki University of Technology SZTAKI: Computer and Automation Research Institute, Hungarian Academy of Sciences
2 Table of Contents 1. Introduction Traser architectural overview rmation representation Registering events ing and reporting CACHING and BUFFERING interoperation with non-traser environments Confidentiality and transfer of information custody Standards future developments References INTRODUCTION In this document the architecture of the infrastructure (software and protocols) is elaborated. 2. TRASER ARCHITECTURAL OVERVIEW Storage Storage Figure 1. system A system consists of the following components: Items: Objects that carry a unique identification number Other objects Reading devices that can read Item Identifications s that allow users to register item related events with or without reading devices s that store item related events s that may query or subscribe to item related information 2
3 Objects may be tangible (a box) or intangible (a purchase order). Objects are of a certain type. Objects have properties. The Object type describes the kind of properties (Property Types). Properties are directed, tagged associations with other objects or with data types. Data types conform to the Data Type system of ISO (UN/CEFACT Core Components) [1]. Data types are represented in XML following the UN/CEFACT XML Naming and Design Rules 2.0 [2]. Items are Objects that have a unique, world wide identification number as a special property. Other properties are assigned to Items by means of Events. Events are registered by s or generated by s. s and s are roles of applications participating in the network. The identification of an Item consists of a URI and a number, unique within the scope of that URI. Identifications may be affixed to the item in the form of a machine readable label: a bar code, an RFID tag or otherwise. Is a Object Item Has Refers to Relates to Has Property or is represented by Event ID@URI Is a DataType Figure 2. Data model Basically, the identification has the format ID@URI. The representation may however differ per label or storage format. The ID and the URI may be stored as different data elements. The ID@URI is the key to information on the Item. The URI must be resolvable and must support defined protocols to store and retrieve that information. Reading devices read the identification of labels or tags of Items. They may also read or add other information and transmit that to the that is to register the recorded information as Event. For the communication between Labels or Tags and Reading devices, and between Reading Devices and s relies on standard protocols, such as ISO Events happen to Items. Events are of an Event Type. The Event Type describes the Properties that may be assigned by the Event to an Item. s upload Events that are recorded, with the Event Timestamp, the Event Type, the responsible organisation and any additional data on the Event as defined by its Type to the, identified by the URI. Events may be triggered by reading tags or labels, but may also happen apart from the Item, e.g. when an Item is sold. s store Item+Event related information. Events are stored, not changed or deleted during the time there information is needed. s may support a retention period, after which outdated information may be cleaned up. protocols do not support active deletion by s. Items are identified by their ID@URI and Events by their timestamp. That information may be retrieved by s, or it may actively be distributed to s that have subscribed to the information. Events may affect other Items as well. Based on rules to be stored on the, other events may be created and uploaded to the applicable servers, see chapter 4. It is at the discretion of the what Event Types it supports and stores per Item Type. s may also restrict the s they serve, but as the objective of 3
4 is to establish an open environment, s should be as tolerant as acceptable in their support to s. s may retrieve Item related information from s by querying them or by subscribing on periodic or event triggered reports. 1.0 allows only predefined queries with the restriction that an Item ID@URI always must be used as a key. Free queries and selection of items by other properties is foreseen in a later version. The concept allows traversing Item related graphs or lattices. Item Item Internet Figure 3. Overall configuration 3. INFORMATION REPRESENTATION Item related information is represented as XML structures in queries and reports. X as a query language allows to filter Event Types and Properties based on arbitrary criteria. limits the selection of Items to the knowledge of their ID@URIs. So it is possible to pose the query Give the colour of item 123@traser.org, but it is not possible to ask Give me the identification numbers of all blue items. In 1.0 queries are predefined. On the semantic web information elements are all regarded as Resources that have URIs. Even values of data types carry a URI. The information is represented as a graph or lattice. One may traverse such graph to retrieve the needed information. This principle resembles the principle in many aspects. Items all have ID@URIs and information can be retrieved by traversing the graph of Items that refer to each other by means of their properties. information is transferred as XML messages. XML has a hierarchical structure. The root of XML messages is an Item or a set of Items, identified by their ID@URI. The set contains all items that are related to an event or that are the response to a query. The structure basically lists the properties of the Items and the properties of other objects. When the property of an Item is another Item, the properties of the other Item are listed in a new tree. To illustrate the structure the following example is given. Note that the precise XML representation may be different in practise, only the overall structure is illustrated. 4
5 <update> <item type= rollcage id= > <event type= stuff id= > <weight unit= kg >5</weight> <location> <address>tracking Lane 1</address> <city>budapest</city> </location> <contains> <item id= /> <item id= /> <item id= /> </contains> </event> </item> <item type= box id= > <event type= pack id= > <weight unit= kg >1</weight> </event> </item> <item type= box id= > <event type= pack id= > <weight unit= kg >1.5</weight> </event> </item> <item type= box id= > <event type= pack id= > <weight unit= kg >2.5</weight> </event> </item> </update> In this example weight is represented by a data type and location is an object without an ID@URI. Properties of Items, contained in the rollcage are represented on top level. XML messages are constructed conform the UN/CEFACT Naming and Design Rules [2]. 4. REGISTERING EVENTS All events to be registered in a data store have the ID@URI of an Item and a timestamp as their key. Events may be triggered by the scanning of a barcode or the reading of an RFID tag, but may also happen when the Item is subject to some administrative or commercial transaction. Depending on the character of the Item and on the application area many kinds of different events may need to be defined. In the pilots a few will be used, related to the asset management and Supply chain control application areas. Examples may be Check out, Check in, Load, Unload, Store, Ship, etc. In the future Event Types will be stored in the UN/CEFACT Core Component Library. Each pre-defined event will have its data structure defined that will be represented as an XML schema. 5
6 An event on one item may trigger events on other items. If, for example, a roll cage is shipped, as a consequence all boxes inside the roll cage are shipped as well. There are two ways to handle such occasion: the status of the boxes may be updated or at query time they are calculated based on them being packed in the roll cage. supports both. Per application it is to be decided whether updates are propagated to related Items or not. The trade-off to be made is between update- and query efficiency. 6
7 Rule Base Item Item 2 1 Internet Figure 4. Propagated uploads 5. QUERYING AND REPORTING nodes may query a on information about Items. In 1.0 no generic query language will be supported, but the queries will be predefined, based on the application requirements. Queries will be expressed in the generic query language X. Responses will be formatted as XML messages conform UN/CEFACT Naming and Design Rules. processing may involve composing new or derived queries by the that are submitted to other servers. E.g. a query that is requesting the weight of the boxes that are contained in a roll cage may imply that the that holds information on the roll cage queries the servers that hold information about the boxes. Rule Base Roll Cage Box 1 2 Internet Figure 5. Propagated queries clients may also subscribe to Item information. rmation delivery may be event based or periodic. Key to subscriptions is always a ID@URI or a list of ID@URIs. 7
8 6. CACHING AND BUFFERING Due to technical limitations (e.g. the availability of an Internet connection) and performance reasons, upload propagation need not always to be performed directly after the original event was uploaded. At several places in the network uploads may temporarily be buffered: - in the transponder, until the transponder (that may have sensors for e.g. temperature) is read by a reading device - in the reading device, until an Internet connection is available to connect to an - in the, until performance allows propagation of the upload. When querying, it is indicated whether it is acceptable for the query client to receive not total up-to-date information. If information at all times need to be up-to-date, the server node, before answering the query, is to request other servers that are likely to produce updates to empty their buffer. These other servers are selected based on relations the item has with other items. E.g. if a box was stuffed in a roll cage, when querying the status of the box, the server of the roll cage is queried as well. Conversely, servers that have received information because of propagated queries may cache the results to improve performance. They may distribute cached information if allowed by the query client. By means of buffering and caching and the indication of service levels in the queries, a trade off can be established between performance and information accuracy and actuality. 8
9 7. INTEROPERATION WITH NON-TRASER ENVIRONMENTS As not all industrial users obey principles (yet), an Item identification scheme may be different from E.g. the identification may be represented as a Serial Shipping Container Code (SSCC) instead. In such case a translation must be made to the ID@URI. For such cases the architecture offers three options: - clients may store information on all non items in a default server with a fixed URI - Based on certain parameters (e.g. the SSCC prefix or the ISO allocation class), stored in local client settings, a URI may be chosen by the upload client - The upload client may access a look-up service, that responds with an URI based on the existing ID plus possible extra characteristics (such as the Item Type) will support protocols to use ID@URI look-up services. The URI stored in a client or looked-up through a service needs not be the final URI where the Item information is stored. The update and query traffic may further be redirected based on criteria at the node. Such redirection however should be invisible for the clients. Another special case is when multiple (but different) ID@URIs are affixed to the item, or when an Item label is replaced with one with a different ID@URI. This may be needed when the IDs are pre-allocated to or pre-printed on the label. In this case all URIs should ultimately point or redirect to the URI where the Item information is stored (see also chapter 6). 8. CONFIDENTIALITY AND TRANSFER OF INFORMATION CUSTODY Not everyone is entitled to upload or query information of Items. Each information category of each Item has an owner. The owner decides who may query and who may upload parts of the information belonging to that category. The concept is however based on an open environment and is jeopardised if upload restrictions are too strict. It should for instance not be necessary for a carrier to register with each of the information owners in order to scan the Items he carries. Item rmation ownership and rights Internet Figure 6. rmation Confidentiality 9
10 Updates of information ownership and user rights is registered as a special kind of events. Change of information ownership may imply that storage services are transferred to a new node. The new owner of the information is also responsible for rendering these services and he may decide to employ another service. It is also possible that the former owner is not authorised any longer to retrieve certain Item related information. Wholesalers for instance sometimes do not wish manufacturers to know who are the final customers. Yet the URI of the first information owner in the chain may be affixed to the Item as a barcode or in an RFID tag. therefore includes a redirect mechanism. In case information storage is transferred to a new server, a link will be established on the old server. rmation upload and retrieval is not performed directly, first the server is interrogated whether he still holds the applicable information. This mechanism is illustrated in figure 6. Principles are: The identity of clients and nodes should be verified by means of signatures and certificates The er is agnostic about information confidentiality requirements, the protocol must always be the same. URI transfers may be cached: the second upload or query is directed to the right node immediately The types of information should be coded (technical, logistic, usage) does not support: The case when downstream parties (e.g. customers) should not know the identity of the URI holder The case when manufacturers refuse to transfer ownership (or have bad or illegal intentions) 10
11 Manufacturer (URI1) Wholesaler (URI2) Retailer (URI3) Carrier I have transport related info on Product with ID 123@URI1 Send it to URI2 I have transport related info on Product with ID 123@URI1 Send it to URI3 I have transport related info on Product with ID 123@URI1 OK Product with ID 123 was on at X OK Figure 7. rmation ownership When some party in the chain drops out without redirecting its URI or without updating the redirects upstream, the chain is broken and information on the Item cannot be retrieved or updated any longer. This problem can not be resolved technically, but should be covered contractually. 9. STANDARDS The various architectural components conform to international standards: Data identification in barcoding (FACT Data Identifiers and GS1 Application Identifiers) Data identification in RFID (ISO 15961, 15962, 15963) ISO (Core Components) IETF RFC 2396 Uniform Resource Identifiers XML Schema X UN/CEFACT XML Naming and Design Rules UN/CEFACT Core Component Library UN/CEFACT Core Component Message Assembly 10. FUTURE DEVELOPMENTS In developments after 1.0 the following extensions to the architecture are foreseen: Free query formulation Dynamic updating of Item and Event types Queries on item information selected by other criteria than ID@URI Explicit support of mobile communication systems and geographical information systems 11
12 Reporting of history and statistics 11. REFERENCES [1] ISO (UN/CEFACT Core Components). [2] UN/CEFACT XML Naming and Design Rules
Create Decryption Policies to Control HTTPS Traffic
Create Decryption Policies to Control HTTPS Traffic This chapter contains the following sections: Overview of Create Decryption Policies to Control HTTPS Traffic, page 1 Managing HTTPS Traffic through
More information3GPP TS V ( )
TS 24.341 V12.6.0 (2014-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Support of SMS over IP networks; Stage 3 (Release 12) The
More informationJISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2)
JISC PALS2 PROJECT: ONIX FOR LICENSING TERMS PHASE 2 (OLT2) Functional requirements and design specification for an ONIX-PL license expression drafting system 1. Introduction This document specifies a
More informationPrivacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data
Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable
More informationAUTACK. Secure authentication and acknowledgement message. Edition 2012
Secure authentication and acknowledgement message Edition 2012 1. Introduction... 2 2. Message Structure Chart... 3 3. Branching Diagram... 4 4. Segments Description... 5 5. Segments Layout... 6 6. Example(s)...
More informationCommon Reference Data Management for TIPS
for TIPS s V0.1.0 Author 4CB Version 0.1.0 Date 16/01/2018 All rights reserved. INTRODUCTION... 4 READER S GUIDE... 4 1. GENERAL FEATURES OF CRDM... 5 1.1. INTRODUCTION TO THE CRDM SERVICE... 5 1.2. ACCESS
More informationAutomationDirect.com Order Import Feature
AutomationDirect.com Order Import Feature This document describes the requirements to upload a CSV or XML format order file from your system into our AutomationDirect.com E-commerce system to create an
More informationWP doc5 - Test Programme
European Commission DG Enterprise IDA PKI European IDA Bridge and Gateway CA Pilot Certipost n.v./s.a. Muntcentrum 1 B-1000 Brussels Disclaimer Belgium p. 1 / 29 Disclaimer The views expressed in this
More informationCCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols
CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services
More informationIPv6 Address Allocation and Assignment Policy
IPv6 Address Allocation and Assignment Policy How to read this draft document: This document relates to a project to improve the readability of RIPE policy documents. If approved, it will replace ripe-512,
More informationSTAR Naming and Design Rules. Version 1.0
Version 1.0 March 2007 Revision History Revision Date Version Initial Version March 13, 2007 1.0 Table of Contents 1. Introduction...1 1.1 Purpose...1 1.2 Objective... 1 1.3 Scope...1 1.4 Prerequisites...1
More informationData Subject Access Request Form
Please read the Guidance Notes which accompany this form before completing the form. Please complete the form in block capitals. Please submit your completed request form as a secure email attachment to
More informationOmni-ID Service Bureau Reference Guide
Omni-ID Service Bureau Reference Guide Based on a Standard Label format Omni-ID office locations: US UK China India Germany D002093-03 TABLE OF CONTENTS INTRODUCTION... 3 LABEL MATERIAL OPTIONS... 3 CHIP
More informationSIP Compliance APPENDIX
APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following
More informationWeb Services Registry Web Service Interface Specification
Nationwide Health Information Network (NHIN) Web Services Registry Web Service Interface V 2.0 1/29/2010 Page 1 of 11 Contributors Name NHIO Represented Organization Craig Miller NHIN-C Vangent Neel Phadke
More information3GPP TS V ( )
3GPP TS 24.379 V13.1.1 (2016-06) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Networks and Terminals; Mission Critical Push To Talk (MCPTT) call control;
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Mobile item identification and management Mobile AIDC application programming interface
INTERNATIONAL STANDARD ISO/IEC 29179 First edition 2012-02-01 Information technology Mobile item identification and management Mobile AIDC application programming interface Technologies de l'information
More informationAUTACK. Secure authentication and acknowledgement message. Edition 2016
EANCOM 2002 S4 Secure authentication and acknowledgement message Edition 2016 1. Introduction... 2 2. Message Structure Chart... 3 3. Branching Diagram... 4 4. Segments Description... 5 5. Segments Layout...
More informationRoyal Mail Mailmark Participant Terms & Conditions
Royal Mail Mailmark Participant Terms & Conditions Who these Royal Mail Mailmark Participant Terms & Conditions apply to: Royal Mail Group Ltd, a company incorporated in England and Wales (number 4138203)
More informationEPC e-mandates e-operating Model. Detailed Specification
Doc: EPC208-08 9 April 2013 Version 1.2 Approved EPC EPC e-mandates e-operating Model Detailed Specification Abstract Document Reference Issue This is the Detailed Specification for the development of
More informationISO/IEC Information technology Software asset management. Part 2: Software identification tag
INTERNATIONAL STANDARD ISO/IEC 19770-2 Second edition 2015-10-01 Corrected version 2017-02 Information technology Software asset management Part 2: Software identification tag Technologies de l information
More informationCitrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service.
Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix.com Data Governance For up-to-date information visit: This section
More informationDocument A: The relationship between VISI, COINS and IDM
Document A: The relationship between VISI, COINS and IDM Contents 1. Introduction... 1 2. VISI concepts... 1 3. COINS... 3 4. IDM - Information Delivery Manual... 5 Process Map... 6 Exchange requirement...
More informationEuropean Component Oriented Architecture (ECOA ) Collaboration Programme: Architecture Specification Part 2: Definitions
European Component Oriented Architecture (ECOA ) Collaboration Programme: Part 2: Definitions BAE Ref No: IAWG-ECOA-TR-012 Dassault Ref No: DGT 144487-D Issue: 4 Prepared by BAE Systems (Operations) Limited
More informationUN/CEFACT SIMPLE, TRANSPARENT AND EFFECTIVE PROCESSES
UN/CEFACT SIMPLE, TRANSPARENT AND EFFECTIVE PROCESSES FOR GLOBAL BUSINESS DRAFT BUSINESS REQUIREMENTS SPECIFICATION (BRS) Vessel domain Business domain: Fisheries Business process: Electronic data exchange
More informationUsing Common Media Manifest with Interoperable Media Format (IMF)
Using Common Media Manifest with Interoperable Media Format (IMF) Motion Picture Laboratories, Inc. 1 CONTENTS 1 Introduction... 4 1.1 Background... 4 1.2 Document Organization... 4 1.3 Document Naming
More informationINFORMATION ON THE PROCESSING OF PERSONAL DATA. (to be inserted in the link at the bottom of the page "privacy policy")
INFORMATION ON THE PROCESSING OF PERSONAL DATA (to be inserted in the link at the bottom of the page "privacy policy") Pra'delle Torri S.r.l. Holiday Centre with head office at Viale Altanea 201 - Pra'
More information2013 edition (version 1.1)
2013 edition (version 1.1) Contents 1 Introduction... 3 2 Signing in to your Office 365 account... 3 2.1 Acceptable Use Policy and Terms of Use... 4 3 Setting your profile and options... 4 3.1 Settings:
More informationCATI Scenario and Architecture
CATI Charging and Accounting Technology for the Internet SNF SPP Projects 5003-054559/1 and 5003-054560/1 CATI Scenario and Architecture Gabriel Dermler IBM Research Division, Zürich Laboratories Workpackage
More informationNotifications for the Payment API
Notifications for the Payment API Legal Disclaimer This document and the information contained herein (collectively, the "Information") is provided to you (both the individual receiving this document and
More informationTRADELENS. Data Sharing Specification. Version General Availability
Introduction This document describes the data sharing model that TradeLens implements. It describes the data that various participants provide to the platform, how that data are shared with others, and
More informationBusiness to Consumer Markets on the Semantic Web
Workshop on Metadata for Security (W-MS) International Federated Conferences (OTM '03) Business to Consumer Markets on the Semantic Web Prof. Dr.-Ing. Robert Tolksdorf, Dipl.-Kfm. Christian Bizer Freie
More informationING Public Key Infrastructure Technical Certificate Policy
ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document
More informationRules for Operators. Version 6 / Version 6, 13 May 2011 Page 1/12
Rules for Operators Version 6 / 2011-05-13 Version 6, 13 May 2011 Page 1/12 TABLE OF CONTENTS 1. Introduction... 3 2. Application for certification and FAMI-QS associate membership... 3 3. Assessment of
More informationProtocol for Tetherless Computing
Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous
More informationA PKI For IDR Public Key Infrastructure and Number Resource Certification
A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect
More informationDepartment of Computer Science. Burapha University 6 SIP (I)
Burapha University ก Department of Computer Science 6 SIP (I) Functionalities of SIP Network elements that might be used in the SIP network Structure of Request and Response SIP messages Other important
More informationICN Content Security Using Encrypted Manifest and Encrypted Content Chunks
ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks Dante Pacella dante@verizon.com Ashish Sardesai ashish.sardesai@verizon.com Mani Tadayon mani.tadayon@verizon.com Venkat Josyula
More informationTechnical Trust Policy
Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality
More informationdraft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo
HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 07:53:57 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 15 Feb 2000 17:03:00 GMT ETag: "3239a5-465b-38a986c4" Accept-Ranges: bytes Content-Length: 18011 Connection:
More informationF O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00
F O U N D A T I O N Unified Architecture Specification Part 1: Concepts Version 1.00 July 28, 2006 Unified Architecture, Part 1 iii Release 1.00 CONTENTS Page FOREWORD... vi AGREEMENT OF USE... vi 1 Scope...
More informationBeginning To Define ebxml Initial Draft
Beginning To Define ebxml Initial Draft File Name Version BeginningToDefineebXML 1 Abstract This document provides a visual representation of how the ebxml Architecture could work. As ebxml evolves, this
More informationHOW PERSISTENT CHAT SERVER WORKS
HOW PERSISTENT CHAT SERVER WORKS LYNC SERVER 2013 Lync Server 2013, Persistent Chat Server enables you to participate in multiparty, topic-based conversations that persist over time. Persistent Chat Server
More informationUsing Common Media Manifest with Interoperable Media Format (IMF)
Using with Interoperable Media Format (IMF) Motion Picture Laboratories, Inc. 1 CONTENTS 1 Introduction... 4 1.1 Background... 4 1.2 Document Naming and Conventions... 4 1.3 Normative References... 5 2
More informationRFM Procedure 3: Certification Body Approval for Chain of Custody Standard. Alaska Responsible Fisheries Management (RFM) Certification Program 17065
RFM Procedure 3: Certification Body Approval for Chain of Custody Standard Alaska Responsible Fisheries Management (RFM) Certification Program 17065 RFM Version 4, Jan 2018 1 1.0 Purpose This document
More informationCisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using Traffic Mirroring, Release 4.0.x
CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Online Advertising Solution Guide: Behavioral Profile Creation Using Traffic Mirroring, Release 4.0.x 1 Overview 2 Configuring Traffic Mirroring
More informationHarePoint HelpDesk for SharePoint. User Guide
HarePoint HelpDesk for SharePoint For SharePoint Server 2016, SharePoint Server 2013, SharePoint Foundation 2013, SharePoint Server 2010, SharePoint Foundation 2010 User Guide Product version: 16.2.0.0
More informationCOMMIUS Project Newsletter COMMIUS COMMUNITY-BASED INTEROPERABILITY UTILITY FOR SMES
Project Newsletter COMMUNITY-BASED INTEROPERABILITY UTILITY FOR SMES Issue n.4 January 2011 This issue s contents: Project News The Process Layer Dear Community member, You are receiving this newsletter
More informationSCP Embraer Supplier Guide
SCP Embraer Supplier Guide Revised 1 Contents Introduction... 5 Getting Started... 5 How to Log In to SCP... 5 Steps to Complete First Time Login... 6 Steps to Log-in to SCP... 7 General Navigation and
More informationMarkLogic Server. Information Studio Developer s Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved.
Information Studio Developer s Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Information
More informationOnlineNIC PRIVACY Policy
OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.
More informationInteroperability and transparency The European context
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Interoperability and transparency The European context ITAPA 2011, Bratislava Francisco García Morán Director General for Informatics Background 2 3 Every European
More informationFAQ of BIPT for the attention of the consumers relating to the compulsory identification of prepaid card users. Contents
FAQ of BIPT for the attention of the consumers relating to the compulsory identification of prepaid card users Contents 1. What does the new regulation relate to?... 3 1.1. What will change?... 3 1.2.
More informationCisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using RDRs, Release 4.1.x
CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Online Advertising Solution Guide: Behavioral Profile Creation Using RDRs, Release 4.1.x 1 Overview 2 Configuring Behavioral Targeting Support:
More informationSECTION III: SEED AND REFERENCE DATA
SECTION III: SEED AND REFERENCE DATA ECP1-ESS-FESSv3.82-3-SECTION III SEED.doc Page 1 of 57 DOCUMENT HISTORY Document History Edi. Rev. Date Description Action (*) Sections 0 01 26/08/2004 Creation I All
More informationNovel System Architectures for Semantic Based Sensor Networks Integraion
Novel System Architectures for Semantic Based Sensor Networks Integraion Z O R A N B A B O V I C, Z B A B O V I C @ E T F. R S V E L J K O M I L U T N O V I C, V M @ E T F. R S T H E S C H O O L O F T
More informationInterface Certification for a RMA Interface
Title Page Interface Certification for a RMA Interface CGI RMA Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1 Supplier... 3 1.2 Product Information... 3 1.3 Operational
More informationCertificate Software Asset Management Essentials Syllabus. Version 2.0
Certificate Software Asset Management Essentials Syllabus Version 2.0 June 2010 Certificate in Software Asset Management Essentials Leaning Objectives Holders of the ISEB Certificate in SAM Essentials
More informationedelivery SMP Profile Test Assertions Description
EUROPEAN COMMISSION DIGIT Connecting Europe Facility edelivery SMP Profile Test Assertions Description European Union, 2018 Reuse of this document is authorised provided the is acknowledged. The Commission's
More informationT2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT SHARED SERVICES (SHRD) FOR
T2/T2S CONSOLIDATION USER REQUIREMENTS DOCUMENT FOR SHARED SERVICES (SHRD) Version: 1.0 Status: FINAL Date: 06/12/2017 Contents 1 EUROSYSTEM SINGLE MARKET INFRASTRUCTURE GATEWAY (ESMIG)... 6 1.1 Overview...
More informationPEFC Certification System Netherlands - Certification Procedures
PCSN SCHEME DOCUMENT PCSN IV Issue 2 10-03-2017 PEFC Certification System Netherlands - Certification Procedures PEFC Netherlands Kokermolen 11 3994 DG Houten The Netherlands Tel: +31 30 693 0040 Fax:
More informationThe search being performed may take a significant time so a forking proxy must send a 100 Trying response.
SIP Response Codes Article Number: 178 Rating: Unrated Last Updated: Wed, Nov 15, 2017 at 2:31 PM SIP Response Codes 1xx Provisional Responses 100 Trying Extended The search being performed may take a
More informationComputer Networks. Introduction to Network. Dr. Adel Gaafar Abd Elrahim
Computer Networks Introduction to Network Dr. Adel Gaafar Abd Elrahim A Communications Model Source generates data to be transmitted Transmitter Converts data into transmittable signals Transmission System
More informationRESOLV EDI CONTROL. User Guide Version 9.2 for HANA PRESENTED BY ACHIEVE IT SOLUTIONS
RESOLV EDI CONTROL User Guide Version 9.2 for HANA PRESENTED BY ACHIEVE IT SOLUTIONS Copyright 2011-2016 by Achieve IT Solutions These materials are subject to change without notice. These materials are
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology
INTERNATIONAL STANDARD ISO/IEC 21000-21 First edition 2013-07-01 Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology Technologies de l'information Cadre multimédia (MPEG-21)
More informationDescription of the TÜV NORD CERT certification procedure GMP+ FC (Feed Certification scheme) of GMP+ International B.V. (NL)
Certific ation Table of contents 1 CERTIFICATION PROCEDURE... 3 1.1 Audit Preparation... 3 1.2 Establishment of readiness for certification... 3 1.3 Temporary approval... 3 1.4 Audit Stage 2 Certification
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationOPC XML-DA Client Driver PTC Inc. All Rights Reserved.
2018 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 Project Architecture 5 Setup 6 Channel Properties General 6 Channel Properties Write Optimizations 7 Channel Properties
More informationInclusions. Your Package Inclusions & Conditions.
Inclusions Your Package Inclusions & Conditions SHOPPING CART WEBSITE You have purchased a fully functional website that has been built using the Woo Commerce Cart plugin on the Word Press platform. Word
More informationIT Supplier Portal Help Manual
IT 1/9 Contenido de este manual Introduction.... 2 How the portal works... 3 If you enter for the first time:... 4 Warning of new document available:... 4 Establish a download reservation.... 6 View article
More informationAccreditation & Certification Supplier Guide
Accreditation & Certification Supplier Guide Network Connectivity Products and Services Connected Health Version 1.0 Table of Contents 1 PREFACE... 3 1.1 AUDIENCE...3 1.2 PURPOSE...3 1.3 SCOPE...3 2 CONNECTED
More informationPublic Key Infrastructures. Andreas Hülsing
Public Key Infrastructures Andreas Hülsing How to share Keys with PGP Attach to mail Use Key Server Still need to verify key validity! 28-5-2014 PAGE 1 PGP Keyserver Synchronization Graph http://www.rediris.es/keyserver/graph.html
More informationPrivacy Policy of
Privacy Policy of www.bitminutes.com This Application collects some Personal Data from its Users. Owner and Data Controller BitMinutes Inc Owner contact email: privacy@bitminutes.com Types of Data collected
More informationGuidelines for Certification Symbol and Standard Mark Guidelines Valid from: 15/12/2014 Distribution: Internal & External
Guidelines for Certification Symbol and Standard Mark Guidelines Valid from: 15/12/2014 Distribution: Internal & External PREPARED BY: Head (MSCD) APPROVED BY: C.E.O PAGE : 1 OF 10 Table of Content 1.
More informationChapter 1: Introduction
EE4272: Computer Networks Chapter 1: Introduction Instructor: Tricia Chigan Dept.: Elec. & Comp. Eng. 1) Data Communications: Deals with the transmission of signals in a reliable & efficient manner. Topics:
More informationInterdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2
Interdomain Federation Guide for IM and Presence Service on Cisco Unified Communications Manager, Release 11.5(1)SU2 First Published: 2017-11-29 Last Modified: 2017-12-01 Americas Headquarters Cisco Systems,
More informationTechnologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.
Technologies for Securing the Networked Supply Chain Alex Deacon Advanced Products and Research Group VeriSign, Inc. Agenda Introduction Security challenges Security technologies in use today Applying
More informationForeScout Extended Module for ServiceNow
ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...
More informationITG. Information Security Management System Manual
ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005
More informationForeScout Extended Module for ServiceNow
ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...
More informationForescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0
Forescout Version 2.0 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationResponse to the. ESMA Consultation Paper:
Response to the ESMA Consultation Paper: Draft technical standards on access to data and aggregation and comparison of data across TR under Article 81 of EMIR Delivered to ESMA by Tahoe Blue Ltd January
More informationSession Initiation Protocol (SIP)
Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part
More informationSpecial Topics. Module 14: "Directory-based Cache Coherence" Lecture 33: "SCI Protocol" Directory-based Cache Coherence: Sequent NUMA-Q.
Directory-based Cache Coherence: Special Topics Sequent NUMA-Q SCI protocol Directory overhead Cache overhead Handling read miss Handling write miss Handling writebacks Roll-out protocol Snoop interaction
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 2: Software identification tag
INTERNATIONAL STANDARD ISO/IEC 19770-2 First edition 2009-11-15 Information technology Software asset management Part 2: Software identification tag Technologies de l'information Gestion de biens de logiciel
More informationInternet Engineering Task Force (IETF) Obsoletes: 7302 September 2016 Category: Informational ISSN:
Internet Engineering Task Force (IETF) P. Lemieux Request for Comments: 7972 Sandflow Consulting LLC Obsoletes: 7302 September 2016 Category: Informational ISSN: 2070-1721 Entertainment Identifier Registry
More informationBCS Practitioner Certificate in Information Risk Management Syllabus
BCS Practitioner Certificate in Information Risk Management Syllabus Version 6.5 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification in Wales,
More informationData Protection Policy
Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...
More informationForescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2
Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationAuthentication Technologies
Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something
More informationAffixing the ISAN. Possibilities Technical specifications
Affixing the ISAN Possibilities Technical specifications 1 The ISAN Identifier ISO 15706 Root Episode Version ISAN 1234-5678-9101-0004-X-0000-00A1-Y Check Serie Episode Work Version 1234-5678-9101-0000-E-0000-0000-A
More informationCase Study: idworx!... electronic WAWF and UID submittals reduces time and errors.
Case Study: idworx!... electronic WAWF and UID submittals reduces time and errors. Case Study Introduction A leading global supplier of systems and services to the Aerospace and Defense industry needed
More informationETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09
ETNA Inter Domain Transport Hayim Porat Ethos Networks 05/09 ETNA 215462 STREP FP7-ICT-2007 The Network of the Future 1 Motivation Inter carrier (inter Domain) service provisioning automation is gaining
More informationNational Aeronautics and Space and Administration Space Administration. cfe Release 6.6
National Aeronautics and Space and Administration Space Administration cfe Release 6.6 1 1 A Summary of cfe 6.6 All qualification testing and documentation is now complete and the release has been tagged
More informationTelenor MDM v x Zero Touch Enrollment
Telenor MDM v.5.38.0x Zero Touch Enrollment Telenor Mobile Device Management Document information Date: 22.11.2018 Version: 5.38.0x EN Version-history Version Date Comments Edited by 1.0 22.11.2018 Format
More informationIntelligence Community and Department of Defense Content Discovery & Retrieval Integrated Project Team (CDR IPT)
Intelligence Community and Department of Defense Content Discovery & Retrieval Integrated Project Team (CDR IPT) IC/DoD REST Encoding Specification for CDR Brokered Search v1.1 12 May 2011 REVISION/HISTORY
More informationIntelligent Products. BIT Research Centre Aalto University, School of Science and Technology, Finland
Intelligent Products Kary Främling BIT Research Centre Aalto University, School of Science and Technology, Finland Tracking with ID@URI Manufacturer Set ID@URI Transp.comp. A ID@URI Transp.comp. B Transp.comp.
More informationRequest for Comments: ISSN: S. Cantor Shibboleth Consortium August 2018
Independent Submission Request for Comments: 8409 Category: Informational ISSN: 2070-1721 I. Young, Ed. Independent L. Johansson SUNET S. Cantor Shibboleth Consortium August 2018 Abstract The Entity Category
More informationSetting Up a Cisco Unified Communications Manager SIP Trunk Integration, page 1
Up a Cisco Unified Communications Manager SIP Trunk Integration This chapter provides instructions for setting up a Cisco Unified Communications Manager SIP trunk integration with Cisco Unity Connection.
More informationCreating User Manageable Security Zones
Creating User Manageable Security Zones The Boeing SCADAnet Technology Craig Dupler, Boeing Eric Byres, Byres Security Inc. Three Important Things for Security 1. Simplicity 2. Bite-size e Pieces 3. Clear
More information