SA Layout SAV3908
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Proceedings 2005
LAC2005 Proceedings 3rd International Linux Audio Conference April 21 – 24, 2005 ZKM | Zentrum fur¨ Kunst und Medientechnologie Karlsruhe, Germany Published by ZKM | Zentrum fur¨ Kunst und Medientechnologie Karlsruhe, Germany April, 2005 All copyright remains with the authors www.zkm.de/lac/2005 Content Preface ............................................ ............................5 Staff ............................................... ............................6 Thursday, April 21, 2005 – Lecture Hall 11:45 AM Peter Brinkmann MidiKinesis – MIDI controllers for (almost) any purpose . ....................9 01:30 PM Victor Lazzarini Extensions to the Csound Language: from User-Defined to Plugin Opcodes and Beyond ............................. .....................13 02:15 PM Albert Gr¨af Q: A Functional Programming Language for Multimedia Applications .........21 03:00 PM St´ephane Letz, Dominique Fober and Yann Orlarey jackdmp: Jack server for multi-processor machines . ......................29 03:45 PM John ffitch On The Design of Csound5 ............................... .....................37 04:30 PM Pau Arum´ıand Xavier Amatriain CLAM, an Object Oriented Framework for Audio and Music . .............43 Friday, April 22, 2005 – Lecture Hall 11:00 AM Ivica Ico Bukvic “Made in Linux” – The Next Step .......................... ..................51 11:45 AM Christoph Eckert Linux Audio Usability Issues .......................... ........................57 01:30 PM Marije Baalman Updates of the WONDER software interface for using Wave Field Synthesis . 69 02:15 PM Georg B¨onn Development of a Composer’s Sketchbook ................. ....................73 Saturday, April 23, 2005 – Lecture Hall 11:00 AM J¨urgen Reuter SoundPaint – Painting Music ........................... ......................79 11:45 AM Michael Sch¨uepp, Rene Widtmann, Rolf “Day” Koch and Klaus Buchheim System design for audio record and playback with a computer using FireWire . 87 01:30 PM John ffitch and Tom Natt Recording all Output from a Student Radio Station . -
2018-07-11 and for Information to the Iso Member Bodies and to the Tmb Members
Sergio Mujica Secretary-General TO THE CHAIRS AND SECRETARIES OF ISO COMMITTEES 2018-07-11 AND FOR INFORMATION TO THE ISO MEMBER BODIES AND TO THE TMB MEMBERS ISO/IEC/ITU coordination – New work items Dear Sir or Madam, Please find attached the lists of IEC, ITU and ISO new work items issued in June 2018. If you wish more information about IEC technical committees and subcommittees, please access: http://www.iec.ch/. Click on the last option to the right: Advanced Search and then click on: Documents / Projects / Work Programme. In case of need, a copy of an actual IEC new work item may be obtained by contacting [email protected]. Please note for your information that in the annexed table from IEC the "document reference" 22F/188/NP means a new work item from IEC Committee 22, Subcommittee F. If you wish to look at the ISO new work items, please access: http://isotc.iso.org/pp/. On the ISO Project Portal you can find all information about the ISO projects, by committee, document number or project ID, or choose the option "Stages search" and select "Search" to obtain the annexed list of ISO new work items. Yours sincerely, Sergio Mujica Secretary-General Enclosures ISO New work items 1 of 8 2018-07-11 Alert Detailed alert Timeframe Reference Document title Developing committee VA Registration dCurrent stage Stage date Guidance for multiple organizations implementing a common Warning Warning – NP decision SDT 36 ISO/NP 50009 (ISO50001) EnMS ISO/TC 301 - - 10.60 2018-06-10 Warning Warning – NP decision SDT 36 ISO/NP 31050 Guidance for managing -
Guidelines on Cryptographic Algorithms Usage and Key Management
EPC342-08 Version 7.0 4 November 2017 [X] Public – [ ] Internal Use – [ ] Confidential – [ ] Strictest Confidence Distribution: Publicly available GUIDELINES ON CRYPTOGRAPHIC ALGORITHMS USAGE AND KEY MANAGEMENT Abstract This document defines guidelines on cryptographic algorithms usage and key management. Document Reference EPC342-08 Issue Version 7.0 Date of Issue 22 November 2017 Reason for Issue Maintenance of document Produced by EPC Authorised by EPC Document History This document was first produced by ECBS as TR 406, with its latest ECBS version published in September 2005. The document has been handed over to the EPC which is responsible for its yearly maintenance. DISCLAIMER: Whilst the European Payments Council (EPC) has used its best endeavours to make sure that all the information, data, documentation (including references) and other material in the present document are accurate and complete, it does not accept liability for any errors or omissions. EPC will not be liable for any claims or losses of any nature arising directly or indirectly from use of the information, data, documentation or other material in the present document. Conseil Européen des Paiements AISBL– Cours Saint-Michel 30A – B 1040 Brussels Tel: +32 2 733 35 33 – Fax: +32 2 736 49 88 Enterprise N° 0873.268.927 – www.epc-cep.eu – [email protected] © 2016 Copyright European Payments Council (EPC) AISBL: Reproduction for non-commercial purposes is authorised, with acknowledgement of the source Table of Content MANAGEMENT SUMMARY ............................................................. 5 1 INTRODUCTION .................................................................... 7 1.1 Scope of the document ...................................................... 7 1.2 Document structure .......................................................... 7 1.3 Recommendations ............................................................ 8 1.4 Implementation best practices ......................................... -
Introducing the IBM Z15 - the Enterprise Platform for Mission-Critical Hybrid Multicloud
IBM United States Hardware Announcement 119-027, dated September 12, 2019 Introducing the IBM z15 - The enterprise platform for mission-critical hybrid multicloud Table of contents 2 Overview 26 Product number 3 Key requirements 57 Publications 3 Planned availability date 60 Technical information 4 Description 72 Terms and conditions 22 Product positioning 74 Prices 24 Statement of general direction 117Order now 118Corrections At a glance Announcing the IBM(R) z15 Today's announcement extends the IBM Z(R) position as the industry-leading platform for mission-critical hybrid cloud, with new innovations across security, data privacy, and resilience. Data privacy and security Pervasive encryption easily encrypts all data associated with an application, database, or cloud service -- whether on premises or in the cloud, at rest or in flight. The IBM z15 extends this beyond the border of the IBM Z environment. • The new IBM Z Data Privacy Passports, in conjunction with IBM z15 and available via an IBM z15 only PID, is being designed to enforce security and privacy protections to data not only on Z, but across platforms. It provides a data-centric security solution that enables data to play an active role in its own protection. For more information about IBM Z Data Privacy Passports V1.0 beta program, see Software Announcement 219-452, dated September 12, 2019. • IBM Z Data Privacy for Diagnostics provides clients with the capability to protect sensitive data that may be included in diagnostic dumps. Now sensitive data can be tagged such that it can be identified in dumps with no impact to dump capture times. -
Year 2010 Issues on Cryptographic Algorithms
Year 2010 Issues on Cryptographic Algorithms Masashi Une and Masayuki Kanda In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions. Currently, the most widely used algorithms appear to be two-key triple DES and RC4 for symmetric ciphers, RSA with a 1024-bit key for an asymmetric cipher and a digital signature, and SHA-1 for a hash function according to international standards and guidelines related to the financial transactions. However, according to academic papers and reports regarding the security evaluation for such algorithms, it is difficult to ensure enough security by using the algorithms for a long time period, such as 10 or 15 years, due to advances in cryptanalysis techniques, improvement of computing power, and so on. To enhance the transition to more secure ones, National Institute of Standards and Technology (NIST) of the United States describes in various guidelines that NIST will no longer approve two-key triple DES, RSA with a 1024-bit key, and SHA-1 as the algorithms suitable for IT systems of the U.S. Federal Government after 2010. It is an important issue how to advance the transition of the algorithms in the financial sector. This paper refers to issues regarding the transition as Year 2010 issues in cryptographic algorithms. To successfully complete the transition by 2010, the deadline set by NIST, it is necessary for financial institutions to begin discussing the issues at the earliest possible date. This paper summarizes security evaluation results of the current algorithms, and describes Year 2010 issues, their impact on the financial industry, and the transition plan announced by NIST. -
Technical Standards Catalogue VERSION 6.2
e-Government Technical Standards Catalogue VERSION 6.2 FINAL September 2005 Technical Standards Catalogue / version 6.2 final / September 2005 1 CONTENTS 1 INTRODUCTION ...........................................................................................................................3 2 CHANGES FROM PREVIOUS VERSION..................................................................................4 3 ISSUES UNDER CONSIDERATION............................................................................................5 4 INTERCONNECTION ...................................................................................................................7 TABLE 1 SPECIFICATIONS FOR INTERCONNECTIVITY.......................................................................7 TABLE 2 SPECIFICATIONS FOR WEB SERVICES ..............................................................................10 5 DATA INTEGRATION ................................................................................................................16 TABLE 3 SPECIFICATIONS FOR DATA INTEGRATION ...........................................................................16 6 CONTENT MANAGEMENT METADATA ...............................................................................19 TABLE 4 SPECIFICATIONS FOR CONTENT MANAGEMENT METADATA .................................................19 TABLE 5 SPECIFICATIONS FOR IDENTIFIERS .......................................................................................20 7 E-SERVICES ACCESS.................................................................................................................23 -
Standards Publications
IRISH STANDARDS PUBLISHED BASED ON CEN/CENELEC STANDARDS 1. I.S. 178:1973 Date published 28 SEPTEMBER 2005 Extruded Rigid PVC Corrugated Sheeting 2. I.S. EN 60835-1-2:1993 Date published 1 JUNE 2005 Methods of measurement for equipment used in digital microwave radio transmission systems -- Part 1: Measurements common to terrestrial radio-relay systems and satellite earth stations -- Section 2: Basic characteristics (IEC 60835-1-2:1992 (EQV)) 3. I.S. EN 160000:1993/A1:1996 Date published 1 JUNE 2005 Generic Specification: Modular electronic units 4. I.S. EN 61595-1:1999 Date published 1 JUNE 2005 Multichannel digital audio tape recorder (DATR), reel-to-reel system, for professional use -- Part 1: Format A (IEC 61595-1:1997 (EQV)) 5. I.S. EN 1990:2002+NA:2010 Date published 24 MARCH 2005 Eurocode - Basis of structural design (including Irish National Annex) 6. I.S. EN ISO 14122-4:2004 Date published 23 FEBRUARY 2005 Safety of machinery - Permanent means of access to machinery - Part 4: Fixed ladders (ISO 14122-4:2004) 7. I.S. EN 13877-1:2004 Date published 23 SEPTEMBER 2005 Concrete pavements - Part 1: Materials 8. I.S. EN 13877-2:2004 Date published 23 SEPTEMBER 2005 Concrete pavements - Part 2: Functional requirements for concrete pavements 9. I.S. EN 12843:2004 Date published 4 MARCH 2005 Precast concrete products - Masts and poles 10. I.S. EN 13225:2005 Date published 4 MARCH 2005 Precast concrete products - Linear structural elements 11. I.S. EN 13693:2004 Date published 4 MARCH 2005 Precast concrete products - Special roof elements 12. -
Method for Managing Isochronous File Transfers in a HAVI Environment
Europäisches Patentamt *EP001239644A1* (19) European Patent Office Office européen des brevets (11) EP 1 239 644 A1 (12) EUROPEAN PATENT APPLICATION (43) Date of publication: (51) Int Cl.7: H04L 29/06, H04L 12/28, 11.09.2002 Bulletin 2002/37 H04N 7/24 (21) Application number: 01400612.6 (22) Date of filing: 08.03.2001 (84) Designated Contracting States: • Autier, Ingrid AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU 92648 Boulogne Cedex (FR) MC NL PT SE TR • Tapie, Thierry Designated Extension States: 92648 Boulogne Cedex (FR) AL LT LV MK RO SI (74) Representative: Kohrs, Martin et al (71) Applicant: THOMSON multimedia Thomson multimedia 92100 Boulogne Billancourt (FR) 46, quai A. Le Gallo 92648 Boulogne-Billancourt Cedex (FR) (72) Inventors: • Mace, Gael 92648 Boulogne Cedex (FR) (54) Method for managing isochronous file transfers in a HAVI environment (57) The invention concerns a method for handling a source device; isochronous files in a HAVi network. - specifying a file to be transferred in isochronous The method is characterized in that it comprises the manner over the connection; steps of: - specifying a starting point, within said file, and from which the transfer is to be carried out; - opening a connection between a client device and - initiating the file transfer from the starting point. EP 1 239 644 A1 Printed by Jouve, 75001 PARIS (FR) EP 1 239 644 A1 Description [0001] The Home Audio Video interoperability (HAVi) architecture is an attempt to accomplish high speed intercon- nectivity over an IEEE 1394 serial bus network for transacting audio/visual data. -
Hardware Security Modules: Attacks and Secure Configuration
Hardware Security Modules: Attacks and Secure Configuration Graham Steel Graham Steel April 2014 Graham Steel - HSM Attacks and Secure Configuration April 2014 - 2/ 56 Secure Hardware History Military: WW2 Enigma machines - captured machines used to help break codes NSA devices with explosive tamper resistance - http://www.nsa.gov/about/cryptologic_heritage/museum/ Commercial: IBM: Cryptoprocessors for mainframes - tamper-resistant switches on case ATMs (cash machines) - Encrypted PIN Pads (EPPs) and Hardware Security Modules (HSMs) Graham Steel - HSM Attacks and Secure Configuration April 2014 - 3/ 56 Secure Hardware History - 2 Cryptographic Smartcards - chip contains cryptoprocessor and keys in memory - used in SIM cards, credit cards, ID cards, transport::: Authentication tokens - generate One-Time Passwords, sometimes USB connection Trusted Platform Module (TPM) - now standard (but unused) in most PC laptops The future.. - Secure Elements in mobile phones, cars,::: Graham Steel - HSM Attacks and Secure Configuration April 2014 - 4/ 56 Example - Cash Machine Network I Introduced in the UK in the late 1960s I First modern machines (with DES) in the 70s and 80s I More than 2 million ATMs worldwide I Network is now global and ubiquitous (at least in cities) Graham Steel - HSM Attacks and Secure Configuration April 2014 - 5/ 56 Simplified Network Schematic ATM Maestro UK SocGen HSBC Graham Steel - HSM Attacks and Secure Configuration April 2014 - 6/ 56 HSMs I Manufacturers include IBM, nCipher, Thales, Utimaco, HP I Cost around $20 000 Graham Steel - HSM Attacks and Secure Configuration April 2014 - 7/ 56 A Word About Your PIN IBM 3624 method: 1. Write account number (PAN) as 0000AAAAAAAAAAAA 2. 3DES encrypt under a PDK (PIN Derivation Key), decimalise first digits 3. -
Tartalom Contents
TARTALOM SZABVÁNYOSÍTÁSI KÖZLEMÉNYEK Nemzeti szabványok közzététele . 1 Standards Journal Nemzeti szabvány visszavonása . 7 Nemzeti szabványok helyesbítése . 7 Hirdetmény jóváhagyó közleménnyel bevezetett szabványok magyar nyelv´´u változatának megjelenésér´´ol . 10 Egyéb szabványosítási közlemények . 12 Új európai szabványkiadványok . 13 58. évfolyam, 2. szám TANÚSÍTÁSI KÖZLEMÉNYEK 2006. február Min´´oségirányítási rendszer tanúsítása . 36 Környezetközpontú irányítási rendszer tanúsítása . 39 Tanúsítási okirat visszavonása . 39 Tanúsítási okiratok módosítása . 39 Szerkeszt´´oség: Tanúsítási okiratok érvényességi idejének lejárta . 40 Budapest IX., Üll´´oi út 25. 1091 EGYÉB KÖZLEMÉNYEK Telefon: 456-6806 Tájékoztató adatok az MSZT tevékenységér´´ol . 45 Telefax: 456-6809; 456-6823 Közlemény . 46 Szabványügyi tanácsi határozat . 46 Levélcím: Budapest 9. Pf. 24 1450 Nemzetközi környezetvédelmi gyermekrajz verseny . 47 MSZT-honlap: http://www.mszt.hu Az új megközelítés´´u irányelvekhez (direktívákhoz) harmonizált érvényes európai szabványok száma és magyar bevezetésük helyzete 2006. január 1-jéig . 48 Az új megközelítés´´u irányelvekhez (direktívákhoz) hasonló irányelvekhez A szerkeszt´´obizottság elnöke: harmonizált érvényes európai szabványok száma és magyar bevezetésük SIMON PÉTER helyzete 2006. január 1-jéig . 49 NEMZETKÖZI SZABVÁNYKIADVÁNYOK A szerkeszt´´obizottság titkára: IEC-szabványkiadványok . 50 EURÓPAI SZABVÁNYOSÍTÁSI ÉS TANÚSÍTÁSI HÍREK, PONGRÁCZ HENRIETTE INFORMÁCIÓK B´´ovült a munkavédelmi tárgyú, magyar nyelven bevezetett, -
A Summary of Control System Security Standards Activities in the Energy Sector
U.S. Department of Energy Office of Electricity Delivery and Energy Reliability A Summary of Control System Security Standards Activities in the Energy Sector Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability October 2005 NSTB National SCADA Test Bed Enhancing control systems security in the energy sector NSTB ABSTRACT This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of several of the sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy (oil, gas, and electric, but not nuclear) sector. A Summary of Control System Security Standards Activities in the Energy Sector i NSTB ii A Summary of Control System Security Standards Activities in the Energy Sector NSTB AUTHOR CONTACTS Rolf E. Carlson Sandia National Laboratories1 Phone: 505.844.9476 E-mail: [email protected] Jeffery E. Dagle Pacific Northwest National Laboratory2 Phone 509.375.3629 E-mail: [email protected] Shabbir A. Shamsuddin Argonne National Laboratory3 Phone 630.252.6273 E-mail: [email protected] Robert P. Evans Idaho National Laboratory4 Phone 208.526.0852 E-mail: [email protected] 1 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000. 2 The Pacific Northwest National Laboratory is operated by Battelle for the U.S. -
Analysis of Applicability of ISO 9564 PIN Based Authentication to Closed-Loop Mobile Payment Systems
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems Amal Saha* Tata Institute of Fundamental Research (TIFR), Mumbai, INDIA, Email: [email protected] Sugata Sanyal Tata Consultancy Services (TCS), Mumbai, INDIA Email: [email protected] *Corresponding Author ————————————Abstract———————————————— Payment transactions initiated through a mobile device are growing and security concerns must be ad- dressed. People coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication in open-loop card payment to closed-loop mobile financial transactions and certification of closed-loop payment product or solution against this standard. In reality, so far this standard has not been adopted in closed-loop mobile payment authentication and applicability of this ISO standard must be studied carefully before adoption. The authors do a critical analysis of the applicability of this ISO specification and makes categorical statement about relevance of compliance to closed-loop mobile payment. Security requirements for authentication in closed-loop mobile payment systems are not standardised through ISO 9564 standard, Common Criteria [3], etc. Since closed-loop mobile payment is a relatively new field, the authors make a case for Common Criteria Recognition Agreement (CCRA) or other standards organization to push for publication of a mobile device-agnostic Protection Profile or standard for it, incorporating the suggested authentication approaches. Keywords: ISO 9564 PIN Based Authentication, Card-Present and Card-Not-Present Transactions, Open-Loop and Closed-Loop Payments, Mobile Payment, Stored-Value-Account, Common Criteria Pro- tection Profile, Device Fingerprinting, m-PIN (mobile PIN), One Time Password (OTP), Android Applica- tion component called Service, backend service.