NATO Interoperability Standards and Profiles

Total Page:16

File Type:pdf, Size:1020Kb

NATO Interoperability Standards and Profiles NISP Volume 1 ADatP-34(K)-REV1 Allied Data Publication 34 (ADatP-34(K)) NATO Interoperability Standards and Profiles Volume 1 Introduction (Version 11) 3 Aug 2018 C3B Interoperability Profiles Capability Team NISP Volume 1 ADatP-34(K)-REV1 NISP Volume 1 ADatP-34(K)-REV1 Table of Contents 1. Introduction .......................................................................................................................... 1 1.1. Purpose of the NISP ................................................................................................. 3 1.2. Intended Audience ..................................................................................................... 3 2. Basic Concepts ..................................................................................................................... 5 2.1. Standards ................................................................................................................... 5 2.2. STANAG ................................................................................................................... 5 2.3. Interoperability Profiles ............................................................................................. 5 2.4. Basic Standards Profile ............................................................................................. 6 2.5. Creating relationships to other concepts and planning objects within NATO .......... 7 2.5.1. Architecture Building Block .......................................................................... 7 2.5.2. FMN Spiral Specifications ............................................................................. 7 2.5.3. Capability Packages ....................................................................................... 8 3. Organization of the NISP Information ................................................................................ 9 3.1. NISP Structure ........................................................................................................... 9 4. Interoperability in Support of Capability Planning ............................................................ 11 5. Configuration Management ................................................................................................ 13 5.1. NISP Update Process .............................................................................................. 14 5.2. NISP Products ......................................................................................................... 15 6. National Systems Interoperability Coordination ................................................................ 17 7. Interoperability Standards Guidance .................................................................................. 19 8. Applicability ....................................................................................................................... 23 A. Profile Guidance ................................................................................................................ 25 A.1. Profile Conceptual Background ............................................................................. 25 A.2. Purpose of Interoperability Profiles ....................................................................... 25 A.3. Applicability ........................................................................................................... 25 A.4. Guidelines for Interoperability Profile Development ............................................. 26 A.5. Structure of Interoperability Profile Documentation .............................................. 26 A.5.1. Identification ................................................................................................ 27 A.5.2. Profile Elements .......................................................................................... 27 A.6. Verification and Conformance ............................................................................... 28 A.6.1. Approach to Validating Service Interoperability Points ............................. 28 A.6.2. Relevant Maturity Level Criteria ................................................................ 28 A.6.3. Key Performance Indicators (KPIs) ............................................................ 28 A.6.4. Experimentation ........................................................................................... 29 A.6.5. Demonstration .............................................................................................. 29 A.7. Configuration Management and Governance ......................................................... 29 A.7.1. Configuration Management ......................................................................... 29 A.7.2. Governance .................................................................................................. 29 B. Interoperability in the context of NATO Defence Planning ............................................. 31 B.1. NATO Defence Planning ....................................................................................... 31 C. Service Interface Profile (SIP) Template Document ......................................................... 33 C.1. References ............................................................................................................... 33 C.2. Background ............................................................................................................. 33 - iii - ADatP-34(K)-REV1 NISP Volume 1 C.3. Scope ....................................................................................................................... 34 C.4. Service Interface Profile Relationships to Other Documents ................................. 34 C.5. Guiding principles for a consolidated SIP/SDS Profile ......................................... 36 C.6. Proposed structure for a consolidated SIP/SDS Profile ......................................... 37 C.7. Testing ..................................................................................................................... 40 D. Changes from NISP Version 10 (J) to NISP Version 11 (K) ........................................... 41 E. Detailed Changes from NISP Version 10 (J) to NISP Version 11 (K) ............................. 43 E.1. New standards ......................................................................................................... 43 E.1.1. Bluetooth SIG .............................................................................................. 43 E.1.2. IEEE ............................................................................................................. 43 E.1.3. IETF ............................................................................................................. 43 E.1.4. ISO ............................................................................................................... 43 E.1.5. ISO/IEC ........................................................................................................ 43 E.1.6. MIP ............................................................................................................... 43 E.1.7. NATO ........................................................................................................... 43 E.1.8. NSO .............................................................................................................. 44 E.1.9. NSO-Expected .............................................................................................. 44 E.1.10. OASIS ........................................................................................................ 44 E.1.11. Open Group ................................................................................................ 44 E.1.12. W3C ........................................................................................................... 44 E.1.13. XML SPIF .................................................................................................. 45 E.1.14. XMPP ......................................................................................................... 45 E.2. Deleted standards .................................................................................................... 45 E.2.1. EIA ............................................................................................................... 45 E.2.2. ETSI ............................................................................................................. 45 E.2.3. ITU ............................................................................................................... 45 E.2.4. ITU-T ........................................................................................................... 45 E.2.5. NSO .............................................................................................................. 45 E.2.6. W3C ............................................................................................................. 46 E.3. Standards changed from candidate to mandatory in the Base Standards Profile .... 46 E.3.1. ACM ............................................................................................................. 46 E.3.2. Bluetooth SIG .............................................................................................. 46 E.3.3. IETF ............................................................................................................. 46 E.3.4. ISO ............................................................................................................... 46 E.3.5. ISO/IEC .......................................................................................................
Recommended publications
  • International Standard Iso 32000-2
    This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-922178 INTERNATIONAL ISO STANDARD 32000-2 First edition 2017-07 Document management — Portable document format — Part 2: PDF 2.0 Gestion de documents — Format de document portable — Partie 2: PDF 2.0 Reference number ISO 32000-2:2017(E) © ISO 2017 This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-922178 ISO 32000-2:2017(E) COPYRIGHT PROTECTED DOCUMENT © ISO 2017, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form orthe by requester. any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of Ch. de Blandonnet 8 • CP 401 ISOCH-1214 copyright Vernier, office Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 www.iso.org [email protected] ii © ISO 2017 – All rights reserved This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-922178 ISO 32000-2:2017(E) Contents Page Foreword ................................................................................................................................................................. vii Introduction .........................................................................................................................................................
    [Show full text]
  • Curtiss-Wright Intelligent Tactical Data Link Translation Gateway Improves and Simplifies Real-Time Warfighter Communications
    NEWS RELEASE FOR IMMEDIATE RELEASE Contact: John Wranovics M: 925.640.6402 [email protected] Curtiss-Wright Intelligent Tactical Data Link Translation Gateway Improves and Simplifies Real-time Warfighter Communications New HUNTR™ software application lets JTACs and TACPs easily create a Multi-Tactical Datalink Network that supports Link 16, VMF, Cursor-On-Target (CoT), JREAP, SADL, and CESMO data exchanges between ground forces, aircraft, ships, and C2 elements ASHBURN, Va. – September 9, 2019 – Curtiss-Wright’s Defense Solutions division, a trusted leading supplier of Tactical Data Link (TDL) software and hardware solutions, announced today that its Tactical Communications Group (TCG) business has introduced HUNTR (TDL Hub and Network Translator), a new intelligent TDL translation gateway for Link 16, Variable Message Format (VMF), Cursor-On-Target (CoT), Joint Range Extension Applications Protocol (JREAP), Situational Awareness Data Link (SADL), and Cooperative ESM Operations (CESMO). Today, moving data between similar and dissimilar data links is a daunting task that can prove an obstacle to mission success. HUNTR is a breakthrough software application that significantly improves and simplifies the real-time translation and routing of TDLs. It provides warfighters and command and control centers with real-time access to accurate operational data in the field. HUNTR supports the automatic routing, forwarding, and translation of J-Series, K-Series, CoT, and CESMO messages and automates processing and translation of multiple, simultaneous Digitally- Aided Close Air Support (DACAS) missions between ground JTAC kits equipped with VMF or CoT radios and air/land/sea Link 16 assets. Designed to run on any Microsoft Windows 10 supported platform, HUNTR delivers instant integration and interoperability for multiple heterogeneous TDLs.
    [Show full text]
  • Ecma International External Liaison Report for 2013-2014
    Ecma/TC39/2014/029 Ecma/TC49/2014/010 Ecma International External Liaison Report for 2013–2014 Prepared for the ISO/IEC JTC 1/SC 22 Plenary in Madrid, Spain September 8–9, 2014 Prepared by Rex Jaeschke [email protected] Date: 2014-07-17 Recommendation to SC 22 regarding the Portable Common Tool Environment (PCTE) Standards The draft agenda for the 2014 Plenary of SC 22 lists the following standards as being up for Periodic Review: • ISO/IEC 13719-1:1998 Information technology -- Portable Common Tool Environment (PCTE) – Part 1: Abstract specification • ISO/IEC 13719-2:1998 Information technology -- Portable Common Tool Environment (PCTE) – Part 2: C programming language binding • ISO/IEC 13719-3:1998 Information technology -- Portable common tool environment (PCTE) – Part 3: Ada programming language binding • ISO/IEC 13719-4:1998 Information technology -- Portable Common Tool Environment (PCTE) – Part 4: IDL binding (Interface Definition Language) These standards were developed and published by Ecma, and then Fast-Tracked to JTC 1. No work has been done on them since and there is no longer a Technical Committee for PCTE. As such, Ecma recommends that SC 22 stabilize these standards. Ecma (www.ecma-international.org) currently has two Technical Committees, TC39 and TC49 (the latter having multiple Task Groups), with SC 22-related projects, as follows: 1. TC39 (ECMAScript language): ECMAScript 5th edition was adopted by the Ecma General Assembly in December 2009, and then published as ISO/IEC 16262:2011 (which ECMA-262 edition 5.1 now matches). The editor of record for the standard is Allen Wirfs-Brock.
    [Show full text]
  • XML: Looking at the Forest Instead of the Trees Guy Lapalme Professor Département D©Informatique Et De Recherche Opérationnelle Université De Montréal
    XML: Looking at the Forest Instead of the Trees Guy Lapalme Professor Département d©informatique et de recherche opérationnelle Université de Montréal C.P. 6128, Succ. Centre-Ville Montréal, Québec Canada H3C 3J7 [email protected] http://www.iro.umontreal.ca/~lapalme/ForestInsteadOfTheTrees/ Publication date April 14, 2019 XML to PDF by RenderX XEP XSL-FO Formatter, visit us at http://www.renderx.com/ XML: Looking at the Forest Instead of the Trees Guy Lapalme Professor Département d©informatique et de recherche opérationnelle Université de Montréal C.P. 6128, Succ. Centre-Ville Montréal, Québec Canada H3C 3J7 [email protected] http://www.iro.umontreal.ca/~lapalme/ForestInsteadOfTheTrees/ Publication date April 14, 2019 Abstract This tutorial gives a high-level overview of the main principles underlying some XML technologies: DTD, XML Schema, RELAX NG, Schematron, XPath, XSL stylesheets, Formatting Objects, DOM, SAX and StAX models of processing. They are presented from the point of view of the computer scientist, without the hype too often associated with them. We do not give a detailed description but we focus on the relations between the main ideas of XML and other computer language technologies. A single compact pretty-print example is used throughout the text to illustrate the processing of an XML structure with XML technologies or with Java programs. We also show how to create an XML document by programming in Java, in Ruby, in Python, in PHP, in E4X (Ecmascript for XML) and in Swift. The source code of the example XML ®les and the programs are available either at the companion web site of this document or by clicking on the ®le name within brackets at the start of the caption of each example.
    [Show full text]
  • Download and Execution, Along with Metadata That Dr
    Table of Contents Preface 5 Purpose and Membership 7 Ecma's role in International Standardization 9 Organization of Ecma International* 10 General Assembly 13 Ordinary members 14 Associate members 16 SME members 17 SPC members 18 Not-for-Profit members 19 Technical Committees 21 Index of Ecma Standards 57 Ecma Standards and corresponding International and European Standards 61 Technical Reports 81 List of Representatives 84 Ecma By-laws 139 Ecma Rules 146 Code of Conduct in Patent Matters 151 Withdrawn Ecma Standards and Technical Reports 153 History of Ecma International 165 Past Presidents / Secretary General 166 * Often called Ecma, or ECMA (in the past), short for Ecma International. - 3 - Preface Information Technology, Telecommunications and Consumer Electronics are key factors in today's economic and social environment. Effective interchange both of commercial, technical, and administrative data, text and images and of audiovisual information is essential for the growth of economy in the world markets. Through the increasing digitalization of information technology, telecommunications and consumer electronics are getting more and more integrated. Open Systems and Distributed Networks based on worldwide recognized standards will not only provide effective interchange of information but also help to remove technical barriers to trade. In particular harmonized standards are recognized as a prerequisite for the establishment of the European economic area. From 1961 until 1994, ECMA (European Computer Manufacturers Association), then Ecma International (Ecma, for short) has actively contributed to worldwide standardization in information technology, communications and consumer electronics (ICT and CE). More than 380 Ecma Standards and 90 Technical Reports of high quality have been published.
    [Show full text]
  • Ecma Template for Minutes
    Memento 2010 Table of Contents Preface 2 Purpose and Membership 3 Ecma's role in International Standardization 4 Organization of Ecma International* 5 General Assembly 7 Ordinary members 8 Associate members 9 SME members 10 SPC members 11 Not-for-Profit members 12 Technical Committees 14 Index of Ecma Standards 45 Ecma Standards and corresponding International and European Standards 48 Technical Reports 63 List of Representatives 66 Ecma By-laws 109 Ecma Rules 115 Code of Conduct in Patent Matters 119 Withdrawn Ecma Standards and Technical Reports 121 History of Ecma International 129 About the Ecma Mementos 130 Past Presidents / Secretaries General 131 * Often called Ecma, or ECMA (in the past), short for Ecma International. Ecma International Rue du Rhône 114 CH-1204 Geneva T/F: +41 22 849 6000/01 www.ecma-international.org IW Memento10.doc 20/01/2010 15:49:00 For Ecma use only Preface Information Technology, Telecommunications and Consumer Electronics are key factors in today's economic and social environment. Effective interchange both of commercial, technical, and administrative data, text and images and of audiovisual information is essential for the growth of economy in the world markets. Through the increasing digitalization of information technology, telecommunications and consumer electronics are getting more and more integrated. Open Systems and Distributed Networks based on worldwide recognized standards will not only provide effective interchange of information but also help to remove technical barriers to trade. In particular harmonized standards are recognized as a prerequisite for the establishment of the European economic area. From 1961 until 1994, ECMA (European Computer Manufacturers Association), then Ecma International (Ecma, for short) has actively contributed to worldwide standardization in information technology, communications and consumer electronics (ICT and CE).
    [Show full text]
  • Download Slides
    Mozilla Rhino Attila Szegedi @asz Thursday, October 13, 11 History • One of the oldest non-Java language runtimes on the JVM • Originally part of Mozilla’s all-Java browser project from 1997. • Has its own bytecode generator engine from day one. Thursday, October 13, 11 What is it? • It’s just JavaScript: • you can run any JavaScript program on top of it. • It’s more than JavaScript: • it integrates with the JVM. You can use Java objects and libraries. Thursday, October 13, 11 Compatibility • Most of ECMAScript 5 • Everything except strict mode • Full JS1.7 (and earlier) support • Partial JS 1.8 support • expression closures, destructuring assignment • no generator expressions • ECMAScript for XML (E4X) • JSON parser/stringifier Thursday, October 13, 11 What it isn’t? • It isn’t a browser JavaScript runtime: • Doesn’t come with HTML DOM out of the box. • HtmlUnit project can be used if that’s needed. Thursday, October 13, 11 Optimization settings • Three optimization levels: • -1: pure interpreter • 0: bytecode compiler; no optimizations • 9: bytecode compiler with optimizations Thursday, October 13, 11 Optimization settings • Let’s compare them using fib(30) function time(f) { t1 = java.lang.System.currentTimeMillis() f() t2 = java.lang.System.currentTimeMillis() print(t2 - t1) } function fib(n) { return n < 2 ? n : fib(n-1) + fib(n-2) } time(function() { fib(30) }) Thursday, October 13, 11 Optimization settings • Let’s compare them using fib(30) • Interpreted took 14 seconds • Opt 0 took 0.9 seconds • Opt 9 took 0.3 seconds Thursday, October 13, 11 When to use which? • Opt 9 in most cases • Opt 0 - don’t really have a modern use case for it • Opt -1: constrained devices, environments that don’t allow you to load generated bytecode at runtime, or when you need continuations*.
    [Show full text]
  • JREAP Vs SIMPLE What’S the Verdict?
    JREAP vs SIMPLE What’s the Verdict? Joint Range Extension Application Protocol (JREAP) vs Standard Interface for Multiple Platform Link Evaluation (SIMPLE) Within the capability streams for distributing Tactical Data Link (TDL) information beyond normal communication limits there exists two military standards: JREAP and SIMPLE. Military staff have therefore asked the question “Which should I implement that can support operations?”. Both are NATO standards born out of the need to distribute information beyond the typical communication limits and provide a mechanism for linking into TDL systems. JREAP was originally implemented through Military Standard (MIL-STD)-3011 but has now been adopted under NATO cover Allied Tactical Data Link Publication (ATDLP)-5.18 (STANAG 5518) and SIMPLE through ATDLP-6.02 (STANAG 5602). In short, JREAP is a deployable tactical capability whereas SIMPLE is used in a test environment. However, this article scrutinises the capabilities and implementation of each and provides a comparison of abilities to support front-line operations. JREAP was developed due to the need to communicate data over long distances, i.e. Beyond Line of Sight (BLOS), without degradation to the message format or content. JREAP takes the message from the format it was originally in and encapsulates it within a JREAP wrapper so that the message can be transmitted over BLOS media and to those platforms not equipped with traditional Link 16 equipment such as Multifunctional Information Distribution Systems (MIDS) terminals. If one was to examine the history of JREAP publications the first MIL-STD-3011 issue is a cut down version of STANAG 5602 Edition 1 with additions to operate over a number of specified communication bearers.
    [Show full text]
  • Code Injection Vulnerabilities in Web Applications - Exemplified at Cross-Site Scripting Martin Johns
    Dissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften Code Injection Vulnerabilities in Web Applications - Exemplified at Cross-site Scripting Martin Johns Eingereicht an der Fakult¨atf¨urInformatik und Mathematik der Universit¨atPassau Gutachter: Prof. Dr. Joachim Posegga Prof. Dr. Dieter Gollmann Submitted April 14th 2009, defended July 22nd 2009 2 Abstract The majority of all security problems in today’s Web applications is caused by string- based code injection, with Cross-site Scripting (XSS) being the dominant representative of this vulnerability class. This thesis discusses XSS and suggests defense mechanisms. We do so in three stages: First, we conduct a thorough analysis of JavaScript’s capabilities and explain how these capabilities are utilized in XSS attacks. We subsequently design a systematic, hierarchical classification of XSS payloads. In addition, we present a comprehensive sur- vey of publicly documented XSS payloads which is structured according to our proposed classification scheme. Secondly, we explore defensive mechanisms which dynamically prevent the execution of some payload types without eliminating the actual vulnerability. More specifically, we discuss the design and implementation of countermeasures against the XSS payloads “Session Hijacking”, “Cross-site Request Forgery”, and attacks that target intranet re- sources. We build upon this and introduce a general methodology for developing such countermeasures: We determine a necessary set of basic capabilities an adversary needs for successfully executing an attack through an analysis of the targeted payload type. The resulting countermeasure relies on revoking one of these capabilities, which in turn renders the payload infeasible. Finally, we present two language-based approaches that prevent XSS and related vul- nerabilities: We identify the implicit mixing of data and code during string-based syn- tax assembly as the root cause of string-based code injection attacks.
    [Show full text]
  • Vrealize Orchestrator 8.2 Plug-Ins
    Using VMware vRealize Orchestrator 8.2 Plug-Ins 15 MARCH 2021 vRealize Orchestrator 8.2 Using VMware vRealize Orchestrator 8.2 Plug-Ins You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2008-2021 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware vRealize Orchestrator Plug-Ins 9 1 Introduction to vRealize Orchestrator Plug-Ins 10 vRealize Orchestrator Architecture 11 Plug-Ins Installed with the vRealize Orchestrator Server 11 Access the vRealize Orchestrator API Explorer 14 Time Zone Codes 15 2 Configure the vRealize Orchestrator Plug-Ins 18 Manage vRealize Orchestrator Plug-Ins 18 Install or Update a vRealize Orchestrator Plug-In 19 Delete a Plug-In 19 3 Using the Active Directory Plug-In 21 Configuring the Active Directory Plug-In 21 Using the Active Directory Plug-In Workflow Library 22 Computer Workflows 22 Organizational Unit Workflows 22 User Workflows 23 User Group Workflows 23 Client-Side Load Balancing for the Active Directory Plug-In 24 4 Using the AMQP Plug-In 25 Configuring the AMQP Plug-In 25 Add a Broker 25 Subscribe to Queues 26 Update a Broker 27 Using the AMQP Plug-In Workflow Library 27 Declare a Binding 28 Declare a Queue 28 Declare an Exchange 29 Send a Text Message 30 Delete a Binding 31 5 Using the Configuration Plug-In 32 6 Using the Dynamic Types Plug-In 34 Dynamic Types Configuration Workflows 34 VMware, Inc.
    [Show full text]
  • Final Draft 2Nd Edition of ECMA-357
    ECMA-357 2nd Edition / December 2005 ECMAScript for XML (E4X) Specification Standard ECMA-357 nd 2 Edition / December 2005 ECMAScript for XML (E4X) Specification Ecma International Rue du Rhône 114 CH-1204 Geneva T/F: +41 22 849 6000/01 www.ecma-international.org . Introduction On 13 June 2002, a group of companies led by BEA Systems proposed a set of programming language extensions adding native XML support to ECMAScript (ECMA-262). The programming language extensions were designed to provide a simple, familiar, general purpose XML programming model that flattens the XML learning curve by leveraging the existing skills and knowledge of one of the largest developer communities worldwide. The benefits of this XML programming model include reduced code complexity, tighter revision cycles, faster time to market, decreased XML footprint requirements and looser coupling between code and XML data. The ECMAScript group (Ecma TC39-TG1) unanimously agreed to the proposal and established a sub-group to standardize the syntax and semantics of a general purpose, cross platform, vendor neutral set of programming language extensions called ECMAScript for XML (E4X). The development of this Standard started on 8 August 2002. This Standard was developed as an extension to ECMAScript Edition 3, but may be applied to other versions of ECMAScript as well. This Standard adds native XML datatypes to the ECMAScript language, extends the semantics of familiar ECMAScript operators for manipulating XML data and adds a small set of new operators for common XML operations, such as searching and filtering. It also adds support for XML literals, namespaces, qualified names and other mechanisms to facilitate XML processing.
    [Show full text]
  • ECMA-357 Ecmascript for XML (E4X) Specification
    ECMA-357 1st Edition / June 2004 ECMAScript for XML (E4X) Specification Standard ECMA-357 st 1 Edition / June 2004 ECMAScript for XML (E4X) Specification Brief History On 13 June 2002, a group of companies led by BEA Systems proposed a set of programming language extensions adding native XML support to ECMAScript (ECMA-262). The programming language extensions were designed to provide a simple, familiar, general purpose XML programming model that flattens the XML learning curve by leveraging the existing skills and knowledge of one of the largest developer communities worldwide. The benefits of this XML programming model include reduced code complexity, tighter revision cycles, faster time to market, decreased XML footprint requirements and looser coupling between code and XML data. The ECMAScript group (Ecma TC39-TG1) unanimously agreed to the proposal and established a sub-group to standardize the syntax and semantics of a general purpose, cross platform, vendor neutral set of programming language extensions called ECMAScript for XML (E4X). The development of this Standard started on 8 August 2002. This Standard was developed as an extension to ECMAScript Edition 3, but may be applied to other versions of ECMAScript as well. This Standard adds native XML datatypes to the ECMAScript language, extends the semantics of familiar ECMAScript operators for manipulating XML data and adds a small set of new operators for common XML operations, such as searching and filtering. It also adds support for XML literals, namespaces, qualified names and other mechanisms to facilitate XML processing. This Standard will be integrated into future editions of ECMA-262 (ECMAScript). The ECMAScript group is working on significant enhancements for future editions of the ECMAScript language, including mechanisms for defining XML types using the XML Schema language and support for classes.
    [Show full text]