0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

More than 1 year has passed since last update.

ISO/TS 23535:2022
Health informatics — Requirements for customer-oriented health cloud service agreements
https://www.iso.org/standard/75957.html

ISO 3015:2019
Petroleum and related products from natural or synthetic sources — Determination of cloud point
https://www.iso.org/standard/72765.html

ISO/IEC 23090-9:2023
Information technology — Coded representation of immersive media — Part 9: Geometry-based point cloud compression
https://www.iso.org/standard/78990.html

ISO/IEC 30118-10:2021
Information technology – Open Connectivity Foundation (OCF) Specification — Part 10: Cloud API for cloud services specification
https://www.iso.org/standard/82136.html

ISO/IEC 30118-11:2021
Information technology – Open Connectivity Foundation (OCF) Specification — Part 11: Device to cloud services specification
https://www.iso.org/standard/82137.html

ISO/IEC 30118-12:2021
Information technology – Open Connectivity Foundation (OCF) Specification — Part 12: Cloud security specification
https://www.iso.org/standard/82138.html

ISO 4320:1977

Non-ionic surface active agents — Determination of cloud point index — Volumetric method
https://www.iso.org/standard/10191.html

ISO 607, Surface active agents — Detergents — Methods of sample division.1)

ISO/IEC 17788:2014

Information technology — Cloud computing — Overview and vocabulary
-> ISO/IEC 22123-1:2023
Information technology — Cloud computing — Part 1: Vocabulary

ISO/IEC 17789:2014

Information technology — Cloud computing — Reference architecture
https://www.iso.org/standard/60545.html

Bibliography

ISO/IEC 27000:2014, Information technology — Security techniques — Information security management systems — Overview and vocabulary
ISO/IEC 27001:2013, Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 27002:2013, Information technology — Security techniques — Information security management systems — Code of practice for information security management
ISO/IEC 27018:2014, Information technology — Security techniques — Information security management systems — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
ISO/IEC/IEEE 24765:2010, Systems and software engineering — Vocabulary
ISO/IEC/IEEE 42010:2011, Systems and software engineering — Architecture description

ISO/IEC 17826:2022

Information technology — Cloud Data Management Interface (CDMI) Version 2.0.0
https://www.iso.org/standard/83451.html

Bibliography

[1] Carl Beame, Robert Thurlow, Brent Callaghan, David Robinson, David Noveck, Mike Eisler, and Spencer Shepler. Network File System (NFS) version 4 Protocol. RFC 3530, April 2003. URL: https://rfc-editor.org/rfc/rfc3530.txt, doi:10.17487/RFC3530.
[2] Tim Berners-Lee, Roy T Fielding, and Larry M Masinter. Uniform Resource Identifier (URI): Generic Syntax. RFC 3986, January 2005. URL: https://rfc-editor.org/rfc/rfc3986.txt, doi:10.17487/RFC3986.
[3] Scott O. Bradner. Key words for use in RFCs to Indicate Requirement Levels. RFC 2119, March 1997. URL: https://rfc-editor.org/rfc/rfc2119.txt, doi:10.17487/RFC2119.
[4] Mallikarjun Chadalapaka, Julian Satran, Kalman Meth, and David L. Black. Internet Small Computer System Interface (iSCSI) Protocol (Consolidated). RFC 7143, April 2014. URL: https://rfc-editor.org/rfc/rfc7143.txt, doi:10.17487/RFC7143.
[5] Douglas Crockford. The application/json Media Type for JavaScript Object Notation (JSON). RFC 4627, July 2006. URL: https://rfc-editor.org/rfc/rfc4627.txt, doi:10.17487/RFC4627.
[6] Lisa M. Dusseault. HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV). RFC 4918, June 2007. URL: https://rfc-editor.org/rfc/rfc4918.txt, doi:10.17487/RFC4918.
[7] Roy Thomas Fielding. REST: Architectural Styles and the Design of Network-based Software Architectures. PhD thesis, University of California, Irvine, 2000. URL: http://www.ics.uci.edu/~fielding/pubs/dissertation/top.htm.
[8] Professor John Franks, Phillip Hallam-Baker, Lawrence C. Stewart, Jeffery L. Hostetler, Scott Lawrence, Paul J. Leach, and Ari Luotonen. HTTP Authentication: Basic and Digest Access Authentication. RFC 2617, June 1999. URL: https://rfc-editor.org/rfc/rfc2617.txt, doi:10.17487/RFC2617.
[9] Ned Freed and Dr. Nathaniel S. Borenstein. Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies. RFC 2045, November 1996. URL: https://rfc-editor.org/rfc/rfc2045.txt, doi:10.17487/RFC2045.
[10] Ned Freed and Dr. Nathaniel S. Borenstein. Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types. RFC 2046, November 1996. URL: https://rfc-editor.org/rfc/rfc2046.txt, doi:10.17487/RFC2046.
[11] Tony Hansen and Alexey Melnikov. Additional Media Type Structured Syntax Suffixes. RFC 6839, January 2013. URL: https://rfc-editor.org/rfc/rfc6839.txt, doi:10.17487/RFC6839.
[12] Russ Housley. Cryptographic Message Syntax (CMS). RFC 5652, September 2009. URL: https://rfc-editor.org/rfc/rfc5652.txt, doi:10.17487/RFC5652.
[13] Russ Housley, Tim Polk, Dr. Warwick S. Ford, and David Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280, May 2002. URL: https://rfc-editor.org/rfc/rfc3280.txt, doi:10.17487/RFC3280.
[14] Karthik Jaganathan, Larry Zhu, and John Brezak. SPNEGO-based Kerberos and NTLM HTTP Authentication in Microsoft Windows. RFC 4559, June 2006. URL: https://rfc-editor.org/rfc/rfc4559.txt, doi:10.17487/RFC4559.
[15] Michael Jones. JSON Web Algorithms (JWA). RFC 7518, May 2015. URL: https://rfc-editor.org/rfc/rfc7518.txt, doi:10.17487/RFC7518.
[16] Michael Jones. JSON Web Key (JWK). RFC 7517, May 2015. URL: https://rfc-editor.org/rfc/rfc7517.txt, doi:10.17487/RFC7517.
[17] Michael Jones, John Bradley, and Nat Sakimura. JSON Web Signature (JWS). RFC 7515, May 2015. URL: https://rfc-editor.org/rfc/rfc7515.txt, doi:10.17487/RFC7515.
[18] Michael Jones and Joe Hildebrand. JSON Web Encryption (JWE). RFC 7516, May 2015. URL: https://rfc-editor.org/rfc/rfc7516.txt, doi:10.17487/RFC7516.
[19] Simon Josefsson. The Base16, Base32, and Base64 Data Encodings. RFC 4648, October 2006. URL: https://rfc-editor.org/rfc/rfc4648.txt, doi:10.17487/RFC4648.
[20] Larry M Masinter and Ernesto Nebel. Form-based File Upload in HTML. RFC 1867, November 1995. URL: https://rfc-editor.org/rfc/rfc1867.txt, doi:10.17487/RFC1867.
[21] Keith McCloghrie, Jürgen Schönwälder, David T. Perkins, and Keith McCloghrie. Structure of Management Information Version 2 (SMIv2). RFC 2578, April 1999. URL: https://rfc-editor.org/rfc/rfc2578.txt, doi:10.17487/RFC2578.
[22] Keith Moore. MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for NonASCII Text. RFC 2047, November 1996. URL: https://rfc-editor.org/rfc/rfc2047.txt, doi:10.17487/RFC2047.
[23] Henrik Frystyk Nielsen, Jeffrey Mogul, Larry M Masinter, Roy T Fielding, Jim Gettys, Paul J. Leach, and Tim Berners-Lee. Hypertext Transfer Protocol - HTTP/1.1. RFC 2616, June 1999. URL: https://rfc-editor.org/rfc/rfc2616.txt, doi:10.17487/RFC2616.
[24] Eric Rescorla. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, August 2018. URL: https://rfc-editor.org/rfc/rfc8446.txt, doi:10.17487/RFC8446.
[25] Eric Rescorla and Tim Dierks. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, August 2008. URL: https://rfc-editor.org/rfc/rfc5246.txt, doi:10.17487/RFC5246.
[26] Krishna Sankar and Arnold Jones. Cloud Data Management Interface (CDMI) Media Types. RFC 6208, April 2011. URL: https://rfc-editor.org/rfc/rfc6208.txt, doi:10.17487/RFC6208.
[27] Jamie Zawinski, Larry M Masinter, and Martin J. Dürst. The 'mailto' URI Scheme. RFC 6068, October 2010. URL: https://rfc-editor.org/rfc/rfc6068.txt, doi:10.174 /RFC6068.
[28] ISO/IEC Joint Directives Maintenance Team. ISO/IEC directives, part 2 – principles and rules for the structure and drafting of ISO and IEC documents. ISO/IEC Directives, Part 2, 2018, 2018. URL: https://www.iso.org/directives-and-policies.html.
[29] ISO/IEC JTC 1/SC 25 Interconnection of information technology equipment. Information technology – small computer system interface (SCSI) – part 414: SCSI architecture model-4 (sam-4). ISO/IEC 14776-414:2009, June 2009. URL: https://www.iso.org/standard/53961.html.
[30] ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection. Information technology – security techniques – storage security. ISO/IEC 27040:2015, January 2015. URL: https://www.iso.org/standard/44404.html.
[31] ISO/IEC JTC 1/SC 38 Cloud Computing and Distributed Platforms. Information technology – cloud computing – overview and vocabulary. ISO/IEC 17788:2014, October 2014. URL: https://www.iso.org/standard/60544.html.
[32] ISO/TC 154 Processes, data elements and documents in commerce, industry and administration. Date and time – representations for information interchange – part 1: basic rules. ISO 8601-1:2019, February 2019. URL: https://www.iso.org/standard/70907.html.
[33] ISO/TC 154 Processes, data elements and documents in commerce, industry and administration. Date and time – representations for information interchange – part 2: extensions. ISO 8601-2:2019, February 2019. URL: https://www.iso.org/standard/70907.html.
[34] ISO/TC 20/SC 13 Space data and information transfer systems. Space data and information transfer systems – open archival information system (OAIS) – reference model. ISO 14721:2012, August 2012. URL: https://www.iso.org/standard/57284.html.
[35] ISO/TC 46 Information and documentation. Codes for the representation of names of countries and their subdivisions – part 1: country codes. ISO 3166-1:2013, November 2013. URL: https://www.iso.org/standard/63545.html.
[36] ISO/TC 46 Information and documentation. Codes for the representation of names of countries and their subdivisions – part 2: country subdivision code. ISO 3166-2:2013, November 2013. URL: https://www.iso.org/standard/63546.html.
[37] ISO/TC 46 Information and documentation. Codes for the representation of names of countries and their subdivisions – part 3: code for formerly used names of countries. ISO 3166-3:2013, November 2013. URL: https://www.iso.org/standard/63547.html.
[38] ISO/TC 68/SC 8 Reference data for financial services. Codes for the representation of currencies. ISO 4217:2015, August 2015. URL: https://www.iso.org/standard/64758.html.
[39] ISO/TC JTC 1/SC 27 Information security, cybersecurity and privacy protection. TLS specification for storage systems. ISO 20648:2016, August 2016. URL: https://www.iso.org/obp/ui/#iso:std:iso-iec:20648:ed-1:v1:en.
[40] Open Grid Forum. Open cloud computing interface v1.1. June 2011. URL: http://occi-wg.org/about/specification/.
[41] POSIX - Austin Joint Working Group. IEEE standard for information technology–portable operating system interface (POSIX(r)) base specifications, issue 7. IEEE 1003.1-2017, December 2017. URL: https://standards.ieee.org/standard/1003_1-2017.html.
[42] Storage Networking Industry Association. TLS specification for storage systems v1.1.0. November 2020. URL: https://www.snia.org/tech_activities/standards/curr_standards/tls.
[43] Information technology – open systems interconnection – the directory – part 8: public-key and attribute certificate frameworks. ISO/IEC 9594-8:2017, May 2017. URL: https://www.iso.org/standard/72557.html.

ISO/IEC 19086-4:2019

Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII
https://www.iso.org/standard/68242.html

SO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 19086-1, Information technology — Cloud computing—Service level agreement (SLA) framework — Part 1: Overview and concepts
ISO/IEC 27017, Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
ISO/IEC 27018, Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
ISO/IEC 29100, Information technology — Security techniques — Privacy framework

Bibliography
[1] ISO/IEC 17789, Information technology — Cloud computing — Reference architecture
[2] ISO/IEC 19086-2, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 2: Metric Model
[3] ISO/IEC 19086-3, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
[4] ISO 19600, Compliance management systems — Guidelines
[5] ISO/IEC 19944, Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use
[6] ISO/IEC 27000, Information technology — Security techniques — Information security management systems — Overview and vocabulary
[7] ISO/IEC 27001, Information technology — Security techniques — Information security management systems — Requirements
[8] ISO/IEC 27002, Information technology — Security techniques — Code of practice for information security controls
[9] ISO/IEC 27031, Information technology — Security techniques — Guidelines for information and communication technology readiness for business continuity
[10] ISO/IEC 27033, Information technology — Security techniques — Network security — Part 1: Overview and concepts
[11] ISO/IEC 27035-1, Information technology — Security techniques — Information security incident management — Part 1: Principles of incident management
[12] ISO/IEC 27035-2, Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response
[13] ISO/IEC 27036-4, Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services
[14] ISO/IEC 27040, Information technology — Security techniques — Storage security
[15] ISO/IEC 29147, Information technology — Security techniques — Vulnerability disclosure
[16] ISO/IEC 30111, Information technology — Security techniques — Vulnerability handling processes
[17] ISO 31000, Risk management — Principles and guidelines
[18] ITU-T Recommendation Y.3502, Information technology — Cloud computing — Reference architecture
[19] ITU-T Recommendation Y.3500, Information technology — Cloud computing — Overview and vocabulary
[20] ISO/IEC JTC 1/SC 27, WG 5 Standing Document 2 — Part 1: Privacy References List. Latest version, available at http://www.jtc1sc27.din.de/sbe/wg5SD2-1

ISO/IEC 19086-1:2016

Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
https://www.iso.org/standard/67545.html

ISO/IEC 17788:2014, Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 17789, Information technology — Cloud computing — Reference architecture

Bibliography

[1] ISO/IEC 9241-171:2008, Ergonomics of human-system interaction — Part 171: Guidance on software accessibility
[2] ISO/IEC 17998, Information technology — SOA Governance Framework
[3] ISO/IEC 19086-2,2 Information technology — Cloud computing — Service level agreement (SLA) framework — Part 2: Metrics
[4] ISO/IEC 19086-3,2) Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
[5] ISO/IEC 19086-4,2) Information technology — Cloud computing — Service level agreement (SLA) framework and technology — Part 4: Security and privacy
[6] ISO/IEC 19944,2) Information technology — Cloud computing — Data and their flow across devices and cloud services
[7] ISO/IEC 20000-1, Information technology — Service management — Part 1: Service management system requirements
[8] ISO/IEC 24751-1, Information technology — Individualized adaptability and accessibility in e-learning, education and training — Part 1: Framework and reference model
[9] ISO/IEC 27001, Information technology — Security techniques — Information security management systems — Requirements
[10] ISO/IEC 27002, Information technology — Security techniques — Code of practice for information security controls
[11] ISO/IEC 27017, Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
[12] ISO/IEC 27018, Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
[13] ISO/IEC 27040, Information technology — Security techniques — Storage security
[14] ISO 29100:2011, Information technology — Security techniques — Privacy framework
[15] ISO/IEC TR 29138 (all parts), Information technology — Accessibility considerations for people with disabilities
[16] ISO/IEC 29151,2) Information technology — Security techniques — Code of practice for personally identifiable information protection
[17] ISO/IEC 38500, Information technology — Governance of IT for the organization
[18] ISO/IEC 40500, Information technology — W3C Web Content Accessibility Guidelines (WCAG) 2.0
[19] ISO/IEC Guide 71, Guide for addressing accessibility in standards
[20] BS 10012:2009, Data protection. Specification for a personal information management system
[21] EN 301 549, Accessibility requirements suitable for public procurement of ICT products and services in Europe (CEN/CENELEC/ETSI)
[22] JIS Q 15001:2006, Personal information protection management systems — Requirements
[23] NIST/SP 800-53, Security and privacy controls for federal information systems and organizations
[24] Section 508 of the Rehabilitation Act of 1973, US Government statute, Standards for IT systems for people with disabilities

ISO/IEC 19086-2:2018

Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
https://www.iso.org/standard/67546.html

SO/IEC 17788, | ITU-T Y.3500, Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 19086-1, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
W3C Recommendation 28 October 2004. XML Schema Part 1: Structures Second Edition. http://www.w3.org/TR/xmlschema-1/
W3C Recommendation 28 October 2004. XML Schema Part 2: Datatypes Second Edition. http://www.w3.org/TR/xmlschema-2/

Bibliography

[1] ISO/IEC/IEEE 15939:2017, Systems and software engineering — Measurement process
[2] ISO/IEC 17789:2014 | ITU-T Y.3502, Information technology — Cloud computing — Reference architecture
[3] ISO/IEC 19086-3, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
[4] ISO/IEC 19086-4, CD Information Technology — Cloud Computing — Service Level Agreement (SLA) Framework – Part 4: Security and Privacy
[5] ISO/IEC 19501, Information technology — Open Distributed Processing — Unified Modeling Language (UML) Version 1.4.2
[6] ISO 80000-1, Quantities and units
[7] NIST 800-53v4, Force, J. T., & Initiative, T. (2013). Security and privacy controls for federal information systems and organizations. NIST Special Publication, 800(53), 8-13

ISO/IEC 19086-2:2018/Amd 1:2023

Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model — Amendment 1
https://www.iso.org/standard/83762.html

ISO/IEC 19086-3:2017

Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
https://www.iso.org/standard/67547.html

ISO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 19086-1, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts

Bibliography

[1] ISO/IEC 17789, Information technology — Cloud computing — Reference architecture
[2] ISO/IEC 19086-2, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 2: Metric Model
[3] ISO/IEC 19086-4, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 4: Security and Privacy
[4] ISO/IEC 19941, Information technology — Cloud computing — Interoperability and portability
[5] ISO/IEC 19944, Information technology — Cloud computing — Data and their flow across devices and cloud services

ISO/IEC 19831:2015

Cloud Infrastructure Management Interface (CIMI) Model and RESTful HTTP-based Protocol — An Interface for Managing Cloud Infrastructure
https://www.iso.org/standard/66296.html

19831:2015 Normative references

DMTF DSP0223, Generic Operations 1.0, http://www.dmtf.org/standards/published_documents/DSP0223_1.0.pdf
DMTF DSP0243, Open Virtualization Format Specification 1.1, http://www.dmtf.org/sites/default/files/standards/documents/DSP0243_1.1.pdf
DMTF DSP1001, Management Profile Specification Usage Guide 1.1, http://www.dmtf.org/standards/published_documents/DSP1001_1.1.pdf
DMTF DSP4004, DMTF Release Process 2.4, http://www.dmtf.org/sites/default/files/standards/documents/DSP4004_2.4.pdf
IANA HTTP Header Registry, http://www.iana.org/assignments/message-headers/perm-headers.html
IEC 80000-13:2008, International Organization for Standardization, Geneva, Switzerland, Quantities and units — Part 13: Information science and technology, April 2008, http://www.iso.org/iso/catalogue_detail?csnumber=31898
IETF RFC2616, R. Fielding et al, Hypertext Transfer Protocol — HTTP/1.1, http://www.ietf.org/rfc/rfc2616.txt
IETF RFC3986, T.Berners-Lee et al, Uniform Resource Identifiers (URI): Generic Syntax, August 1998, http://www.ietf.org/rfc/rfc3986.txt
IETF RFC4627, D. Crockford, The application/json Media Type for JavaScript Object Notation (JSON), July 2006, http://www.ietf.org/rfc/rfc4627.txt
IETF RFC5246, T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, http://www.ietf.org/rfc/rfc5246.txt
ISO 8601:20044, International Organization for Standardization, Geneva, Switzerland, Data elements and interchange formats — Information interchange — Representation of dates and times, March 2008, http://www.iso.org/iso/iso_catalogue/ catalogue_tc/catalogue_detail.htm?csnumber=40874
ISO/IEC 14977:1996, Roger S. Scowen, Extended BNF — A generic base standard. Software Engineering Standards Symposium 1993. http://www.iso.org/iso/catalogue_detail?csnumber=26153
ISO/IEC Directives, Part 2, Rules for the structure and drafting of International Standards, http://isotc.iso.org/livelink/livelink.exe?func=ll&objId=4230456&objAction=browse&sort=subtype
NIST Special Publication 800-145, Peter Mell and Timothy Grance, The NIST Definition of Cloud Computing, Sept. 2011, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
NIST Special Publication 500-292, Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf, NIST Cloud Computing Reference Architecture, Sept. 2011, http://collaborate.nist.gov/twiki-cloudcomputing/pub/CloudComputing/ReferenceArchitectureTaxonomy/NIST_SP_500-292_-_090611.pdf
Representational State Transfer, Roy Fielding, Doctoral dissertation, University of California, Architectural Styles and the Design of Network-based Software Architectures (Chapter 5), 2000, http://www.ics.uci.edu/~fielding/pubs/dissertation/rest_arch_style.htm
XMLSchema - Part 1, World Wide Web Consortium (W3C) Recommendation, H. Thompson, et al., Editors, XML Schema Part 1: Structures Second Edition, 28 October 2004, http://www.w3.org/TR/xmlschema-1/
XMLSchema - Part 2, World Wide Web Consortium (W3C) Recommendation, P. Biron, A. Malhotra, Editors, XML Schema Part 2: Datatypes (Second Edition), 28 October 2004, http://www.w3.org/TR/xmlschema-2/

ISO/IEC 19941:2017

Information technology — Cloud computing — Interoperability and portability
https://www.iso.org/standard/66639.html

Bibliography
[1] ISO 15836, Information and documentation — The Dublin Core metadata element set
[2] ISO/TR 20943-5, Information technology — procedures for achieving metadata registry content consistency — Part 5: Metadata mapping procedure
[3] ISO/IEC 17203, Information technology — Open Virtualization Format (OVF) specification
[4] ISO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary
[5] ISO/IEC 17789, Information technology — Cloud computing — Reference architecture
[6] ISO/IEC 19086-1, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
[7] ISO/IEC 19944:2017, Information technology — Cloud computing — Data and their flow across devices and cloud services
[8] ISO/IEC 21320-1, Information technology — Document Container File — Part 1: Core
[9] ISO/IEC 27000, Information technology — Security techniques— Information security management systems— Overview and vocabulary
[10] ISO/IEC 27001, Information technology — Security techniques— Information security management systems— Requirements
[11] ISO/IEC 27017, Information technology — Security techniques— Code of practice for information security controls based on ISO/IEC 27002 for cloud services
[12] ISO/IEC 27018, Information technology — Security techniques— Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
[13] European Interoperability Framework (EIF) Towards Interoperability for European Public Services, Available from http://ec.europa.eu/isa/documents/eif_brochure_2011.pdf
[14] Wang W.G., Tolk A., Wang W.P., (2009), The Levels of Conceptual Interoperability Model: Applying Systems Engineering Principles to M&S, Available from http://arxiv.org/ftp/arxiv/papers/0908/0908.0191.pdf
[15] Cloud Standards Customer Council, (2014), Practical Guide to Cloud Computing V2.0, Available from http://www.cloud-council.org/deliverables/CSCC-Practical-Guide-to-Cloud-Computing.pdf
[16] Regulation (EU), 2016/679, General Data Protection Regulation, Available from http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf
[17] NIST FIPS, 140-2 (including change notices as of 12-03-2002) Security Requirements for Cryptographic Modules, Available from http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf
[18] IETF RFC, 4511 (2006): Lightweight Directory Access Protocol (LDAP), Available from https://tools.ietf.org/html/rfc4511
[19] IETF RFC, 6749 (2012): The OAuth 2.0 Authorization Framework, Available from https://tools.ietf.org/html/rfc6749
[20] Open I.D., (2014): OpenID Connect, Available from http://openid.net/connect/
[21] OASIS, (2005): Security Assertion Markup Language (SAML) 2.0, Available from http://saml.xml.org/saml-specifications
[22] PCI Security Standards Council, (2011), PCI Data Security Standard (PCI DSS), Available from https://www.pcisecuritystandards.org/documents/Virtualization_InfoSupp_v2.pdf

ISO/IEC 19944-1:2020

Cloud computing and distributed platforms ─ Data flow, data categories and data use — Part 1: Fundamentals

ISO/IEC 17788:2014, Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 17789:2014, Information technology — Cloud computing — Reference architecture

Bibliography

[1] ISO/IEC 19086-1, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
[2] ISO/IEC 19944-2:—5, Cloud computing and distributed platforms — Cloud services and devices: data flow, data categories and data use — Part 2: Use and extension guidance
[3] ISO/IEC 20889:2018, Privacy enhancing data de-identification terminology and classification of techniques
[4] ISO 21931-2:2019, Sustainability in buildings and civil engineering works — Framework for methods of assessment of the environmental, social and economic performance of construction works as a basis for sustainability assessment — Part 2: Civil engineering works
[5] ISO/IEC 22624:2020, Information technology — Cloud computing — Taxonomy based data handling for cloud services
[6] ISO/IEC 22989:—6, Information Technology — Artificial Intelligence — Artificial Intelligence Concepts and Terminology
[7] ISO/IEC 23053:—7, Information Technology — Artificial Intelligence — Framework for Artificial Intelligence (AI) Systems Using Machine Learning (ML)
[8] ISO/IEC CD 23751:—8, Information technology — Cloud computing and distributed platforms — Data sharing agreement (DSA) framework
[9] ISO/IEC 27033-3:2010, Information technology — Security techniques — Network security — Part 3: Reference networking scenarios — Threats, design techniques and control issues
[10] ISO/IEC 27040, Information technology — Security techniques — Storage security
[11] ISO 27701:2019, Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines
[12] ISO/IEC 29100:2011, Information technology — Security techniques — Privacy framework
[13] ISO/IEC 29110-4-3:2018, Systems and software engineering — Lifecycle profiles for very small entities (VSEs) — Part 4-3: Service delivery — Profile specification
[14] ISO/IEC 38505-1, Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data
[15] ICO, (Information Commissioner’s Office). Deleting personal data: Data Protection Act, Version 1.1, 2014. Available from: https://ico.org.uk/for_organisations/guidance_index/~/media/documents/library/Data_Protection/Practical_application/deleting_personal_data.pdf
[16] Reardon J., Basin D., Capkun S., SOK: Secure Data Deletion, IEEE Symposium on Security and Privacy, 2013. Available from: http://www.ieee-security.org/TC/SP2013/papers/4977a301.pdf
[17] General Data Protection Regulation (GDPR). 2016. Available from: https://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf
[18] UK Investigatory Powers Act. 2016, . Available from: http://www.legislation.gov.uk/ukpga/2016/25/contents/enacted/data.htm
[19] Amended Act on the Protection of Personal Information in Japan. 2006. Available from: http://law.e-gov.go.jp/htmldata/H15/H15HO057.html
[20] The Personal Information Protection and Electronic Documents Act (PIPEDA), 2019. Available from: https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/

ISO/IEC 19944-2:2022

Cloud computing and distributed platforms — Data flow, data categories and data use — Part 2: Guidance on application and extensibility

ISO/IEC 19944-1:2020, Cloud computing and distributed platforms ─ Data flow, data categories and data use — Part 1: Fundamentals
ISO/IEC 22123-1, Information technology — Cloud computing — Part 1: Vocabulary
ISO/IEC 22989,1 Information technology — Artificial intelligence — Artificial intelligence concepts and terminology

Bibliography

[1] ISO/IEC 20924:2021, Information technology — Internet of Things (IoT) — Vocabulary
[2] ISO/IEC 22624:2020, Information technology — Cloud computing — Taxonomy based data handling for cloud services
[3] ISO/IEC/TR 23188:2020, Information technology — Cloud computing — Edge computing landscape
[4] ISO/IEC 27701:2019, Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines
[5] ISO/IEC 29100:2011, Information technology — Security techniques — Privacy framework

ISO/TR 21332:2021

Health informatics — Cloud computing considerations for the security and privacy of health information systems
https://www.iso.org/standard/70568.html

Bibliography

[1] ISO/IEC 17789, Information technology — Cloud computing — Reference architecture
[2] ISO 18308, Health informatics — Requirements for an electronic health record architecture
[3] ISO/IEC 27001, Information technology — Security techniques — Information security management systems — Requirements
[4] ISO/IEC 27002, Information technology — Security techniques — Code of practice for information security controls
[5] ISO/IEC 27005, Information technology — Security techniques — Information security risk management
[6] ISO/IEC 27017, Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
[7] ISO/IEC 27018, Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
[8] ISO/IEC 27036-2, Information technology — Security techniques — Information security for supplier relationships — Part 2: Requirements
[9] ISO/IEC 27102:2019, Information security management — Guidelines for cyber-insurance
[10] Health and Social Care Cloud Security – Good Practice Guide – NHS Digital – 2018
[11] Cloud Security Guidance – National Cyber Security Centre - 2018
[12] ISO 15489-1, Information and documentation — Records management — Part 1: Concepts and principles
[13] ISO/TR 18492, Long-term preservation of electronic document-based information
[14] ISO/TR 21548, Health informatics — Security requirements for archiving of electronic health records — Guidelines
[15] ISO/IEC 10181-3, Information technology — Open Systems Interconnection — Security frameworks for open systems: Access control framework
[16] ISO/IEC 13888 (all parts), Information security — Non-repudiation
[17] ISO/IEC 30111, Information technology — Security techniques — Vulnerability handling processes
[18] Information technology — Cloud Data Management Interface (CDMI)
[19] ISO/IEC 17963, Web Services for Management (WS-Management) Specification
[20] ISO/IEC 9594-8, Information technology — Open systems interconnection — Part 8: The Directory: Public-key and attribute certificate frameworks
[21] ISO/IEC 19941, Information technology — Cloud computing — Interoperability and portability
[22] ISO/IEC 19086-3, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
[23] ISO/IEC 19944 (all parts), Cloud computing and distributed platforms ─ Data flow, data categories and data use
[24] ISO/IEC 19086-1, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
[25] ISO/IEC 18384 (all parts), Information technology— Reference architecture for service-oriented architecture (SOA RA)
[26] Health and Social Care Cloud Risk Framework - 2018
[27] ISO/IEC 29100:2011/Amd.1:2018, Information technology — Security techniques — Privacy framework/ — Amendment 1: Clarifications
[28] ISO/IEC 19086-2, Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
[29] ISO/IEC/TR 30102, Information technology — Distributed Application Platforms and Services (DAPS) — General technical principles of Service Oriented Architecture
[30] 7 Myths of Healthcare Cloud Security Debunked Don’t let these common myths stall your healthcare cloud initiative. ClearData
[31] 7 StepS to Developing a ClouD SeCurity plan. NaviSite, Inc., 2014
[32] Box: Redefining Security for the Cloud. Box Security Whitepaper.
[33] CHRISTIE A. Choosing Your Connection to the Cloud, Executive.
[34] Cloud Computing Data access anywhere, anytime – always secure. Lockheed Martin Information Systems & Global Solutions
[35] Cybersecurity Bill of Rights. National Association of Insurance Commissioners. 2015
[36] Data Security in The Cloud, Credant.Technologies, Inc.
[37] DAUN S., KIMBLE A. The Privacy Challenges of Cloud Computing. Bond Dickinson LLP. 2015
[38] Embracing Cloud in Health: a European Risk Assessment Framework A guide to privacy and security considerations for the adoption of cloud services in the health sector. Microsoft. 2014
[39] Getting Secure in the Cloud How to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency. Marketing Connections, Inc. and Lockheed Martin Corporation. 2011
[40] HURST D., MATSUMOTO S. Securing Applications in the Cloud. Cloud Security Alliance. 2009
[41] Hype Cycle for Cloud Security, Gartner. 2015
[42] In die Cloud – aber sicher!. Bundesamt für Sicherheit in der Informationstechnik – BSI. 2014
[43] Information: To share or not to share? The Information Governance Review. 2013
[44] Is the Cloud Ready to Manage Security? Entrust
[45] LABLANS M., BORG A., UCKERT F. A RESTful interface to pseudonymization services in modern web applications. BMC Medical Informatics & Decision Making. 2015
[46] Latest Developments on Cloud Computing and Security, Healthcare Informatics Custom Media.
[47] RADFORD C. J. Still Cloudy with Security Definitely in the Forecast for, 2015. 2015 Cloud Security Predictions. 2014
[48] SLACK A. What Happens to Data When Cloud Services Say Goodbye?. Infosecurity Magazine. 2015
[49] The 7 Essential Layers of Secure Cloud Computing Safeguard your PHI by taking a “Defend the Castle” approach to cloud computing. ClearData
[50] THORP J., FLETCHER G., WEHNERT J., GESSNER C., NICOLAS L. Report on Cloud Computing in Health. 2015
[51] Your Flight Plan for Cloud Security, Credant.Technologies, Inc . 2012
[52] ISO/IEC 29101:2018, Information technology — Security techniques — Privacy architecture framework
[53] ISO/IEC 29100, Information technology — Security techniques — Privacy framework
[54] ISO/IEC 17788:2014, Information technology — Cloud computing — Overview and vocabulary
[55] ISO/IEC 19770 (all parts), Information technology — IT asset management
[56] ISO 28000:2007, Specification for security management systems for the supply chain
[57] ISO/IEC 27000, Information technology — Security techniques — Information security management systems — Overview and vocabulary
[58] ISO/IEC 19770-1:2017, Information technology — IT asset management — Part 1: IT asset management systems — Requirements
[59] ISO/IEC 27034
[60] BS 7858:2019, Screening of individuals working in a secure environment. Code of practice

ISO/IEC 22123-1:2023

Information technology — Cloud computing — Part 1: Vocabulary
https://www.iso.org/standard/82758.html

Bibliography
[1] ISO 19011:2018, Guidelines for auditing management systems
[2] ISO/IEC 20889:2018, Privacy enhancing data de-identification terminology and classification of techniques
[3] ISO/IEC 21931-2:2019, Sustainability in buildings and civil engineering works — Framework for methods of assessment of the environmental, social and economic performance of construction works as a basis for sustainability assessment — Part 2: Civil engineering works
[4] ISO/IEC 29100:2011/Amd.1:2018, Information technology — Security techniques — Privacy framework/ — Amendment 1: Clarifications
[5] ISO/IEC/IEEE 42010:2022, Systems and software engineering — Architecture description

ISO/IEC 23751:2022

Information technology — Cloud computing and distributed platforms — Data sharing agreement (DSA) framework
https://www.iso.org/standard/76834.html

Bibliography

General

[1] ISO/IEC/TR 23186, Information technology — Cloud computing — Framework of trust for processing of multi-sourced data
[2] ISO/IEC 17789, Information technology — Cloud computing — Reference architecture
[3] ISO/IEC 19944-1, Cloud computing and distributed platforms ─ Data flow, data categories and data use — Part 1: Fundamentals
[4] ISO/IEC 30141, Internet of Things (IoT) — Reference Architecture
[5] ISO/IEC 19941, Information technology — Cloud computing — Interoperability and portability
[6] ISO/IEC 25012, Software engineering — Software product Quality Requirements and Evaluation (SQuaRE) — Data quality model
[7] About The Licenses - Creative Commons
[8] ISO/IEC 22123-1:2021 Identity
[9] ISO/IEC 29115, Information technology — Security techniques — Entity authentication assurance framework
[10] ISO/IEC TS 29003, Information technology — Security techniques — Identity proofing
[11] ISO/IEC 27554, Application of ISO 31000 for assessment of identity management-related risk
[12] ISO/IEC 24760 (all parts), IT Security and Privacy — A framework for identity management
[13] ISO/IEC 29146, Information technology — Security techniques — A framework for access management Privacy
[14] ISO/IEC 29100, Information technology — Security techniques — Privacy framework
[15] ISO/IEC 29101, Information technology — Security techniques — Privacy architecture framework
[16] ISO/IEC 27701, Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines
[17] ISO/IEC 27018, Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
[18] ISO/IEC 29151, Information technology — Security techniques — Code of practice for personally identifiable information protection
[19] ISO/IEC 27555, Information security, cybersecurity and privacy protection — Guidelines on personally identifiable information deletion
[20] ISO/IEC 29184, Information technology — Online privacy notices and consent
[21] ISO/IEC 29134, Information technology — Security techniques — Guidelines for privacy impact assessment
[22] ISO/IEC 29190, Information technology — Security techniques — Privacy capability assessment model
[23] ISO/IEC TR 27550, Privacy engineering for system lifecycle processes
[24] ISO/IEC 27556, User-centric framework for PII handling based on privacy preferences
[25] ISO/IEC TS 27570, Privacy guidelines for smart cities
[26] Privacy Guidelines OECD, Chain of custody
[27] ISO/IEC 20889, Privacy enhancing data de-identification terminology and classification of techniques
[28] ISO/IEC 27038, Information technology — Security techniques — Specification for digital redaction Forensics related chain of custody
[29] ISO/IEC 27050 (all parts), Information technology — Electronic discovery
[30] ISO/IEC 27037, Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence
[31] ISO/IEC 27041, Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method
[32] ISO/IEC 27042, Information technology — Security techniques — Guidelines for the analysis and interpretation of digital evidence
[33] ISO/IEC 27043, Information technology — Security techniques — Incident investigation principles and processes
General security
[34] ISO/IEC 27001, Information technology — Security techniques — Information security management systems — Requirements
[35] ISO/IEC 27002, Information security controls
[36] ISO/IEC 27005, Information technology — Security techniques — Information security risk management
[37] ISO/IEC 27014, Information security, cybersecurity and privacy protection — Governance of information security
[38] ISO/IEC 27017, Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
[39] ISO/IEC 27036-All parts, Information technology — Security techniques — Information security for supplier relationships
[40] ISO/IEC 27040, Information technology — Security techniques — Storage security
[41] ISO/IEC 27035 (all parts), Information technology — Security techniques — Information security incident management
[42] ISO/IEC 19086-4, Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII
[43] ISO/IEC 20547-4, Information technology — Big data reference architecture — Part 4: Security and privacy
[44] ISO/IEC 27045, Information technology — Big data security and privacy — Guidelines for data security management framework
[45] ISO/IEC 27071, Information technology — Security techniques — Security recommendations for establishing trusted connections between devices and services
[46] ISO 8000 (all parts), Data quality
[47] ISO/IEC 27729:2012, Information and documentation — International standard name identifier (ISNI)
[48] ISO 2382:2015, Information technology — Vocabulary
[49] ISO/IEC 19086-1:2016, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
[50] ISO/IEC 20924:2018, Information technology — Internet of Things (IoT) — Vocabulary
[51] ISO 3534-2:2006, Statistics — Vocabulary and symbols — Part 2: Applied statistics
[52] ISO/IEC/IEEE 15288, Systems and software engineering — System life cycle processes
[53] ISO/IEC 27000, Information technology — Security techniques — Information security management systems — Overview and vocabulary
[54] ISO 15836 (all parts), Information and documentation — The Dublin Core metadata element set
[55] ISO/IEC 19790:2012, Information technology — Security techniques — Security requirements for cryptographic modules

ISO/TR 22428-1:2020

Managing records in cloud computing environments — Part 1: Issues and concerns
https://www.iso.org/standard/73173.html

ISO 30300, Information and documentation — Management system for records — Core concepts and vocabulary
ISO 13008, Information and documentation — Digital records conversion and migration process
ISO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary

Bibliography

[1] ISO 14721, Space data and information transfer systems — Open archival information system (OAIS) — Reference model
[2] ISO 15489-1, Information and documentation — Records management — Part 1: Concepts and principles
[3] ISO 16363, Space data and information transfer systems — Audit and certification of trustworthy digital repositories
[4] ISO 17068, Information and documentation — Trusted third arty repository for digital record
[5] ISO/IEC 17789, Information technology — Cloud computing — Reference architecture
[6] ISO/TR 18128, Information and documentation — Risk assessment for records processes and systems
[7] ISO/IEC 19086-1:2016, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
[8] ISO/IEC 19831, Cloud Infrastructure Management Interface (CIMI) Model and RESTful HTTP-based Protocol — An Interface for Managing Cloud Infrastructure
[9] ISO/IEC 19941, Information technology — Cloud computing — Interoperability and portability
[10] ISO/IEC/TR 20000-9, Information technology — Service management — Part 9: Guidance on the application of ISO/IEC 20000‑1 to cloud services
[11] ISO 23081-1, Information and documentation — Records management processes — Metadata for records — Part 1: Principles
[12] ISO/IEC 27000, Information technology — Security techniques — Information security management systems — Overview and vocabulary
[13] ISO/IEC 27017, Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
[14] ISO/IEC 27036-4, Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services
[15] ISO 31000, Risk management — Guidelines
[16] ISO/IEC 38505-1, Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data
[17] InterPARES Trust Project Final Report, 2016
[18] MoReq2010 Specification v1.1, 2010

ISO/IEC 22624:2020

Information technology — Cloud computing — Taxonomy based data handling for cloud services
https://www.iso.org/standard/73614.html

ISO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 19944, Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use

[1] ISO/IEC 19941:2017, Information technology — Cloud computing — Interoperability and portability
[2] ISO/IEC 27001:2013, Information technology — Security techniques — Information security management systems — Requirements
[3] ISO/IEC 27017:2015, Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
[4] ISO/IEC 27000:2018, Information technology — Security techniques — Information security management systems — Overview and vocabulary
[5] ISO/IEC 38505-1:2017, Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data
[6] ISO/IEC 38500:2015, Information technology — Governance of IT for the organization
[7] ISO/IEC/TR 38505-2, Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management
[8] BS 10010:2017, Information classification, marking and handling. Specification, https://shop.bsigroup.com/ProductDetail/?pid=000000000030330941
[9] Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance), avail. at https://eur-lex.europa.eu/eli/reg/2016/679/2016-05-04
[10] Regulation (EU) 2018/1807 of the European Parliament and of the Council of 14 November 2018 on a framework for the free flow of non-personal data in the European Union (Text with EEA relevance.) Avail. at http://data.europa.eu/eli/reg/2018/1807/oj
[11] ISO 24534-5:2011, Intelligent transport systems — Automatic vehicle and equipment identification — Electronic Registration Identification (ERI) for vehicles — Part 5: Secure communications using symmetrical techniques

ISO/IEC TR 22678:2019

Information technology — Cloud computing — Guidance for policy development
https://www.iso.org/standard/73642.html

ISO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary

Bibliography
Cloud computing concepts
[1] ISO/IEC 17789, Information technology — Cloud computing — Reference architecture
[2] ISO/IEC 19941, Information technology — Cloud computing — Interoperability and portability
[3] ISO/IEC 19944, Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use
[4] ISO/IEC 22123, Information technology — Cloud computing — Concepts and terminology
[5] ITU-T Y.3501, 2016, Cloud computing — Framework and high-level requirements
Cloud computing contracts and agreements

[6] ISO/IEC 19086-1, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
[7] ISO/IEC 19086-2, Information technology — Cloud Computing — Service Level Agreement (SLA) Framework — Part 2: Metric Model
[8] ISO/IEC 19086-3, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
[9] ISO/IEC 19086-4, Information technology — Cloud Computing — Service Level Agreement (SLA) Framework — Part 4: Components of Security and Protection of PII
Security
[10] ISO/IEC 19772, Information technology — Security techniques — Authenticated encryption
[11] ISO/IEC 27001, Information technology — Security techniques — Information security management systems — Requirements
[12] ISO/IEC 27002, Information technology — Security techniques — Code of practice for information security controls
[13] ISO/IEC 27017, Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
[14] ISO/IEC 27030, Information technology — Security techniques — Guidelines for security and privacy in Internet of Things (IoT)
[15] ISO/IEC 27050 (all parts), Information technology — Electronic discovery
[16] ISO/IEC 27036-4:2016, Information technology — Security techniques — Information security for supplier relationships — Part 4: Guidelines for security of cloud services
[17] ISO/IEC 27070, Information technology — Security techniques — Security requirements for establishing virtualized roots of trust
[18] ISO/IEC TS 27570, Information technology — Security techniques — Privacy guidelines for Smart Cities
[19] ITU-T X.1601, Cloud Computing Security Framework
Privacy
[20] ISO/IEC 20889, Information technology — Security techniques — Privacy enhancing data de-identification techniques
[21] ISO/IEC 27018, Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
[22] ISO/IEC 27552, Information technology — Security techniques — Enhancement to ISO/IEC 27001 for privacy management — Requirements
[23] ISO/IEC 29100, Information technology — Security techniques — Privacy framework
Service management
[24] ISO/IEC 20000 (all parts), Information technology — Service management
Accessibility
[25] ISO/IEC 29138-1, Information technology — User interface accessibility — Part 1: User accessibility needs
[26] ISO/IEC 40500:2012, Information technology — W3C Web Content Accessibility Guidelines (WCAG) 2.0
[27] ETSI EN 301-549, Accessibility requirements suitable for public procurement of ICT products and services in Europe
[28] W3C 2015-09-24, Authoring Tool Accessibility Guidelines (ATAG) 2.0
[29] W3C 2014-03-20, Accessible Rich Internet Applications (WAI-ARIA) 1.0
[30] W3C 2014-03-20, WAI-ARIA 1.0 User Agent Implementation Guide
[31] W3C 2013-03-28, Role Attribute 1.0
[32] W3C 2002-12-17, User Agent Accessibility Guidelines 1.0
[33] W3C 2000-02-03, Authoring Tool Accessibility Guidelines 1.0
[34] W3C 1999-05-05, Web Content Accessibility Guidelines 1.0
[35] ISO/IEC Guide 71:2014, Guide for addressing accessibility in standards
Governance
[36] ISO/IEC 38500, Information technology — Governance of IT for the organization
[37] ISO/IEC 38505-1, Information technology — Governance of IT — Governance of data — Part 1: Application of ISO/IEC 38500 to the governance of data
[38] ISO/IEC/TR 38505-2, Information technology — Governance of IT — Governance of data — Part 2: Implications of ISO/IEC 38505-1 for data management
Energy efficiency
[39] COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS — “Building a European Data Economy”
[40] ISO/IEC 19395, Information technology — Sustainability for and by information technology — Smart data centre resource monitoring and control
[41] ISO/IEC 30134-2, Information technology — Data centres — Key performance indicators — Part 2: Power usage effectiveness (PUE)
[42] ISO/IEC 30134-4, Information technology — Data centres — Key performance indicators — Part 4: IT Equipment Energy Efficiency for servers (ITEEsv)
[43] ISO/IEC 30134-5, Information technology — Data centres — Key performance indicators — Part 5: IT Equipment Utilization for servers (ITEUsv)
Use of standards for policy development
[44] ISO/IEC. Using and referencing ISO and IEC standards to support public policy, https://www.iso.org/publication/PUB100358.pdf
[45] Trends in Telecommunication Reform 2016: Regulatory Incentives to Achieve Digital Opportunities 2016 — ITU-D ISBN 978-92-61-16551-2
[46] Global ICT Regulatory Outlook 2017 — ITU-D ISBN 978-92-61-22091-4

ISO 22995:2019

Petroleum products — Determination of cloud point — Automated step-wise cooling method
https://www.iso.org/standard/74319.html

ISO 3170, Petroleum liquids — Manual sampling
ISO 3171, Petroleum liquids — Automatic pipeline sampling

Bibliography

[1] ISO 2049, Petroleum products — Determination of colour (ASTM scale)
[2] ISO 3015, Petroleum products — Determination of cloud point
[3] ISO 4259 (all parts), Petroleum and related products — Precision of measurement methods and results
[4] ISO 4259:2006, 1Petroleum products — Determination and application of precision data in relation to methods of test
[5] Inter-Laboratory Study Report 2015-601, Cloud Point (CP) Precision statements of the generic automated method EN ISO 22995, Hélène Coulombeau-Leroy and Chris Gray, published 2017-12-01, available from CEN/TC 19 Secretariat, NEN, Vlinderweg 6, 2623 AX Delft (NL), energy@nen.nl

ISO/IEC TS 23167:2020

Information technology — Cloud computing — Common technologies and techniques
https://www.iso.org/standard/74805.html

ISO/IEC 22123-1:—1, Information technology — Cloud computing — Part 1:Terminology

Bibliography

[1] ISO/IEC 17788:2014, Cloud computing — Overview and vocabulary2
[2] ISO/IEC 17789:2014, Cloud computing — Reference architecture3
[3] Google, Google App Engine, https://cloud.google.com/appengine/
[4] IBM, IBM Cloud Functions, https://www.ibm.com/cloud/functions
[5] Amazon, AWS Lambda, https://aws.amazon.com/lambda/
[6] Apache Software Foundation, OpenWhisk serverless cloud platform project, [online] [viewed 2019-10-7], https://openwhisk.apache.org/
[7] Cloud Standards Customer Council, Practical Guide to Platform-as-a-Service (2015), http://www.cloud-council.org/deliverables/CSCC-Practical-Guide-to-PaaS.pdf
[8] Open Containers Initiative, Runtime Specificiation v1.0.1, https://github.com/opencontainers/runtime-spec/releases/download/v1.0.1/oci-runtime-spec-v1.0.1.pdf
[9] Open Containers Initiative, Image Format Specification, v1.0.1, https://github.com/opencontainers/image-spec/releases/download/v1.0.1/oci-image-spec.-v1.0.1.pdf
[10] Newman S., Building Microservices. O’Reilly (2015).
[11] Lewis J., Fowler M., Microservices, [online]. [viewed 2019-10-7], Available at http://martinfowler.com/articles/microservices.html
[12] Paul C., Jamshidi P., Microservices: A systematic Mapping Study, Proceedings of the 6th International Conference on Cloud Computing and Services Science — Volume 1 and 2, (CLOSER 2016).
[13] Namiot D., Sneps-Sneppe M., On micro-services architecture, International Journal of Open Information Technologies, vol.2, no.9, 2014.
[14] Thones J., Microservices, IEEE software, 32(1), 2015.
[15] Alshuqayran N., Ali N., Evans R., A Systematic Mapping Study in Microservice Architecture, IEEE Proceedings of the 9th International Conference on Service-oriented Computing and Applications, 2016.
[16] The New Stack, Automation and Orchestration with Docker and Containers (2016), https://thenewstack.io/ebooks/docker-and-containers/automation-orchestration-docker-containers/
[17] Cloud Native Computing Foundation, Kubernetes, https://kubernetes.io/
[18] ISO/IEC 17203:2017, Information technology — Open Virtualization Format (OVF) specification4
[19] Brad Calder et al, Windows Azure Storage: A Highly Available Cloud Storage Service with Strong Consistency, SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, 2011
[20] IETF, Network File System (NFS) Version 4 Minor Version 2 Protocol, https://tools.ietf.org/html/rfc7862
[21] Amazon, Amazon Elastic File System, [online] [viewed 2019-10-7], Available at https://aws.amazon.com/efs/
[22] IBM, File Storage, [online] [viewed 2019-10-07], https://console.bluemix.net/catalog/infrastructure/file-storage
[23] IETF RFC 7143, Internet Small Computer System Interface (iSCSI) Protocol5
[24] Apache Software Foundation, Kafka distributed streaming platform, [online] [viewed 2019-10-7], https://kafka.apache.org/
[25] Amazon, Amazon Simple Storage Service API Reference, [online] [viewed 2019-10-7], https://docs.aws.amazon.com/AmazonS3/latest/API/s3-api.pdf
[26] ISO 232576, Blockchain and distributed ledger technologies — Reference architecture7
[27] Toby Clemson, Testing Strategies in a Microservice Architecture, [online] [viewed 2019-10-7], https://martinfowler.com/articles/microservice-testing/#anatomy-modules
[28] Eclipse Foundation, MicroProfile API, [online] [viewed 2019-10-7]8
[29] Istio, Service mesh platform [online] [viewed 2019-10-7], https://istio.io/
[30] Linkerd, Service sidecar, [online] [viewed 2019-10-7], https://linkerd.io/
[31] Eric Evans, Domain-Driven Design: Tackling Complexity in the Heart of Software, Addison-Wesley Professional (2003)
[32] Git, Git source control management, [online] [viewed 2019-10-7], https://git-scm.com
[33] Jenkins, Jenkins automation server, [online] [viewed 2019-10-7], https://jenkins.io
[34] Red Hat Ansible, Ansible IT automation platform, [online] [viewed 2019-10-7], https://www.ansible.com
[35] CFEngine, CFEngine configuration management technology, [online] [viewed 2019-10-7], https://cfengine.com/product/community/
[36] Chef, Chef automation, [online] [viewed 2019-10-7], https://github.com/chef/chef-workstation
[37] Puppet, Puppet automation software, [online] [viewed 2019-10-7], https://github.com/puppetlabs/puppet
[38] Gartner, DevSecOps: How to Seamlessly Integrate Security Into DevOps, (2016), https://www.gartner.com/doc/3463417/devsecops-seamlessly-integrate-security-devops
[39] Gartner, 10 Things to Get Right for Successful DevSecOps, (2017), https://www.gartner.com/doc/3811369/-things-right-successful-devsecops
[40] NIST SP 800-77 (2005), Guide to IPsec VPNs9
[41] IETF RFC 7348 (2014), Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks10
[42] VMWare, (2018), CONTAINERS AND CONTAINER NETWORKING For Network Engineers, [online] [viewed 2019-10-7], https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/products/nsx/vmware-containers-and-container-networking-whitepaper.pdf
[43] Project Calico, Project Calico Overview, [online] [viewed 2019-10-7], https://www.projectcalico.org/
[44] weaveworks, Weave Net, [online] [viewed 2019-10-7], https://www.weave.works/oss/net/
[45] Gartner (2014): Platform as a Service: Definition, Taxonomy and Vendor Landscape, 2014. https://www.gartner.com/doc/2833022/platform-service-definition-taxonomy-vendor
[46] Gartner (2018): Hype Cycle for Platform as a Service, 2018. https://www.gartner.com/doc/3885966/hype-cycle-platform-service-
[47] Apache Software Foundation, CouchDB project, [online] [viewed 2019-10-7], http://couchdb.apache.org/
[48] The New Stack, Guide to Serverless Technologies (2018), https://thenewstack.io/ebooks/serverless/guide-to-serverless-technologies/
[49] Cloud Native Computing Foundation, CloudEvents Specification, [online] [viewed 2019-10-7] https://cloudevents.io/
[50] Serverless Inc, Serverless Framework, [online] [viewed 2019-10-7], https://github.com/serverless/serverless
[51] Cloud Native Computing Foundation, (2018), Serverless Whitepaper v1.0, [online] [viewed 2019-10-7], https://github.com/cncf/wg-serverless/blob/master/whitepapers/serverless-overview/cncf_serverless_whitepaper_v1.0.pdf
[52] Archfirst (2015), Domain-Driven Design — Layered Architecture, [online] [viewed 2019-10-7], https://archfirst.org/domain-driven-design-6-layered-architecture/
[53] Microsoft, (2018), Design a DDD-oriented microservice, [online] [viewed 2019-10-7], https://docs.microsoft.com/en-us/dotnet/standard/microservices-architecture/microservice-ddd-cqrs-patterns/ddd-oriented-microservice
[54] Methods & Tools, An Introduction to Domain Driven Design, http://www.methodsandtools.com/archive/archive.php?id=97
[55] Martin Fowler, (2014), CircuitBreaker, [online] [viewed 2019-10-7], https://martinfowler.com/bliki/CircuitBreaker.html
[56] Microsoft, (2019), The API gateway pattern versus the Direct client-to-microservice communication, [online] [viewed 2019-10-7] https://docs.microsoft.com/en-us/dotnet/standard/microservices-architecture/architect-microservice-container-applications/direct-client-to-microservice-communication-versus-the-api-gateway-pattern
[57] Apache Software Foundation, Mesos project, http://mesos.apache.org/
[58] HashiCorp, Nomad project, [online] [viewed 2019-10-7], https://www.nomadproject.io/
[59] Cloud Foundry, Open Source Cloud Application Platform, [online] [viewed 2019-10-7], https://www.cloudfoundry.org/
[60] Microsoft, Azure Functions, [online] [viewed 2019-10-7], https://azure.microsoft.com/en-us/services/functions/
[61] Google, Cloud Functions serverless compute platform, [online] [viewed 2019-10-7], https://cloud.google.com/functions/
[62] IBM, Cloud functions FaaS platform, [online] [viewed 2019-10-7], https://console.bluemix.net/openwhisk/
[63] Oracle, Fn serverless platform, [online] [viewed 2019-10-7], https://fnproject.io/
[64] Amazon, Aurora Serverless database, [online] [viewed 2019-10-7], https://aws.amazon.com/rds/aurora/serverless/
[65] Fauna, FaunaDB, [online] [viewed 2019-10-7], https://fauna.com/
[66] Google, Cloud Firestore, [online] [viewed 2019-10-7], https://cloud.google.com/firestore/
[67] IBM, Cloudant database, [online] [viewed 2019-10-7], https://console.bluemix.net/catalog/services/cloudant
[68] Microsoft, Azure Data Lake, [online] [viewed 2019-10-7], https://azure.microsoft.com/en-us/solutions/data-lake/
[69] ISO/IEC 18384-1:2016, Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 1: Terminology and concepts for SOA11
[70] Linux Foundation, Open API specification, [online] [viewed 2019-10-7], https://www.openapis.org/
[71] ISO/IEC 9075:2016, Information technology — Database languages — SQL — Part 1: Framework (SQL/Framework)12
[72] ISO/IEC 9660:1988, Information processing — Volume and file structure of CD-ROM for information interchange13
[73] ISO/IEC 13346-1:1995, Information technology — Volume and file structure of write-once and rewritable media using non-sequential recording for information interchange — Part 1: General14
[74] Amazon, AWS Cloud Storage, [online] [viewed 2019-10-7], https://aws.amazon.com/what-is-cloud-storage
[75] Redhat Inc, Redhat Storage, [online] [viewed 2019-10-7], https://www.redhat.com/en/topics/data-storage
[76] Microsoft, Microsoft Azure Storage, [online] [viewed 2019-10-7], https://azure.microsoft.com/en-us/services/storage
[77] IETF RFC 7230 (2014), HTTP Hypertext Transfer Protocol15
[78] Linux Foundation, Node.js® runtime, [online] [viewed 2019-10-7], https://nodejs.org/en/
[79] Docker Inc, Docker Swarm, [online] [viewed 2019-10-7], https://github.com/docker/swarm
[80] Docker Inc, Docker Hub, [online] [viewed 2019-10-7], https://hub.docker.com
[81] YAML.org, YAML data serialization standard, [online] [viewed 2019-10-7], https://yaml.org/
[82] ECMA-404:2017, The JSON Data Interchange Syntax, http://www.ecma-international.org/publications/files/ECMA-ST/ECMA-404.pdf
[83] Oracle, Oracle Autonomous Database, [online] [viewed 2019-10-7], https://www.oracle.com/database/autonomous-database.html
[84] Oracle, Oracle NoSQL Database, [online] [viewed 2019-10-7], https://cloud.oracle.com/nosql
[85] ISO/IEC 21878:2018, Information technology — Security techniques — Security guidelines for design and implementation of virtualized servers16
[86] ISO/IEC/IEEE 24765:2017, Systems and software engineering — Vocabulary17
[87] ISO/IEC 18384-3, Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 3: Service Oriented Architecture ontology18

ISO/IEC TR 23186:2018

Information technology — Cloud computing — Framework of trust for processing of multi-sourced data
https://www.iso.org/standard/74844.html

ISO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary

Bibliography

[1] ISO 8000-2:2018, Data quality — Part 2: Vocabulary
[2] ISO/IEC 13156:2011, Information technology — Telecommunications and information exchange between systems — High rate 60 GHz PHY, MAC and PALs
[3] ISO/IEC 15836, Information and documentation — The Dublin Core metadata element set
[4] ISO/IEC 17789, Information technology — Cloud computing — Reference architecture
[5] ISO/IEC 19086-4, Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII
[6] ISO/IEC 19941, Information technology — Cloud computing — Interoperability and portability
[7] ISO/IEC 19944, Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use
[8] ISO/IEC 25010, Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — System and software quality models
[9] ISO/IEC 27000, Information technology — Security techniques — Information security management systems — Overview and vocabulary
[10] ISO/IEC 27002:2005, Information technology — Security techniques — Code of practice for information security management
[11] ISO/IEC 27050-1, Information technology — Security techniques — Electronic discovery — Part 1: Overview and concepts
[12] ISO/IEC 27017, Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
[13] ISO/IEC 29100, Information technology — Security techniques — Privacy framework
[14] ISO/IEC 30141, Internet of Things Reference Architecture (IoT RA)
[15] Cited after “ISO/IEC 27018 — Safeguarding Personal Information in the Cloud”, BSI whitepaper, 2015, avail. at https://www.bsigroup.com/Documents/iso-iec-27018/ISOIEC-27018-Safeguarding-information-in-the-cloud-whitepaperDec2015.pdf
[16] Protecting Consumer Privacy in an Era of Rapid Change - Recommendations for Businesses and Policymakers, FTC report, 2012, avail. at https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf
[17] Data protection laws in Latin America — An overview, https://www.linkedin.com/pulse/data-protection-laws-latin-america-overview-renato-leite-monteiro/
[18] Privacy Law in Latin America & The Caribbean, https://www.bna.com/privacy-law-latin-m17179927240/

ISO/IEC TR 23187:2020

Information technology — Cloud computing — Interacting with cloud service partners (CSNs)
https://www.iso.org/standard/74845.html

ISO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 17789, Information technology — Cloud computing — Reference architecture
ISO/IEC 19086-1, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts

Bibliography

[1] ISO/IEC 17021-1, Conformity assessment — Requirements for bodies providing audit and certification of management systems — Part 1: Requirements
[2] ISO 19011:2018, Guidelines for auditing management systems
[3] ISO/IEC 19086-2, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
[4] ISO/IEC 19086-3, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
[5] ISO/IEC 19086-4, Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII
[6] ISO/IEC 19941, Information technology — Cloud computing — Interoperability and portability
[7] ISO/IEC 19944, Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use
[8] ISO/IEC 22123-1, (CD) Information technology — Cloud computing — Part 1: Terminology
[9] ISO/IEC/TR 22678:2019, Information technology — Cloud computing — Guidance for policy development
[10] ISO/IEC/TS 23167, Information technology — Cloud computing — Common technologies and techniques
[11] ISO/IEC/TR 23188, Information technology — Cloud computing — Edge computing landscape
[12] ISO/IEC 27001, Information technology — Security techniques — Information security management systems — Requirements
[13] ISO/IEC 27007, Information technology — Security techniques — Guidelines for information security management systems auditing
[14] ISO/IEC 27017, Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
[15] ISO/IEC 27018, Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
[16] ISO/IEC 27036-4:2016, Information technology — Security techniques — Information security for supplier relationships -- Part 4: Guidelines for security of cloud services
[17] ISO/IEC 38505 (all parts), Information technology — Governance of IT — Governance of data
[18] Recommendation I.T.U.-T.Y. 3522:2016 End-to-end cloud service lifecycle management requirements https://www.itu.int/rec/T-REC-Y.3522-201609-I

ISO/IEC TR 23188:2020

Information technology — Cloud computing — Edge computing landscape
https://www.iso.org/standard/74846.html

ISO/IEC 22123-1:—2, Information technology — Cloud computing — Part 1: Terminology
ISO/IEC TS 23167, Information technology — Cloud computing — Common technologies and techniques

Bibliography

[1] ISO/IEC 29100:2011/Amd 1:2018, Information technology — Security techniques — Privacy framework3
[2] ISO/IEC 30141:2018, Information technology — Internet of Things Reference Architecture4
[3] IEC, (2017), White paper: Edge Intelligence http://www.iec.ch/whitepaper/pdf/IEC_WP_Edge_Intelligence.pdf
[4] ISO/IEC 17789:2014, Information technology — Cloud computing — Reference architecture5
[5] ISO/IEC 17788:2014, Information technology — Cloud computing — Overview and vocabulary6
[6] Node-RED, Flow-based programming for the Internet of Things7
[7] Medium, The 9 Types of Software Platforms8
[8] ISO/IEC 20924, Information technology — Internet of Things (IoT) — Definition and vocabulary9
[9] IETF RFC 7348, Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks10
[10] VMWare, (2018), CONTAINERS AND CONTAINER NETWORKING For Network Engineers11, Last accessed September 10 2018
[11] Project Calico, Project Calico Overview https://www.projectcalico.org/ Last accessed September 10 2018.
[12] weaveworks, Weave Net https://www.weave.works/oss/net/ Last accessed September 10 2018.
[13] IBM, Gaian database https://developer.ibm.com/code/open/projects/gaian-database/ Last accessed September 10 2018.
[14] Apache, Kafka, A distributed streaming platform https://kafka.apache.org/ Last accessed September 10 2018.
[15] ETSI, (2015), Mobile Edge Computing white paper https://www.etsi.org/images/files/ETSIWhitePapers/etsi_wp11_mec_a_key_technology_towards_5g.pdf
[16] Industrial Internet Consortium, (2017), The Industrial Internet of Things Volume G1: Reference Architecture https://www.iiconsortium.org/IIC_PUB_G1_V1.80_2017-01-31.pdf
[17] OpenFog Consortium, (2017), OpenFog Reference Architecture Technical Paper https://www.openfogconsortium.org/ra/
[18] OpenStack Foundation, (2017), Cloud Edge Computing https://www.openstack.org/assets/edge/OpenStack-EdgeWhitepaper-v3-online.pdf
[19] StateOfTheEdge Consortium, (2018), State of the Edge Report https://www.stateoftheedge.com/report/
[20] Edge Computing Consortium, (2017), Edge Computing Reference Architecture 2.0 http://en.ecconsortium.net/Uploads/file/20180328/1522232376480704.pdf
[21] Alliance A., 2018), Continuous Delivery in IoT Environments https://www.agilealliance.org/resources/experience-reports/continuous-delivery-in-iot-environments/ Last accessed October 27 2018
[22] ISO/IEC 19944:2017, Information technology — Cloud computing — Cloud services and devices: Data flow, data categories and data use12
[23] OWASP, Security by Design Principles https://www.owasp.org/index.php/Security_by_Design_Principles
[24] ETSI TS 102 034 V2.1.1 (2016-04), Transport of MPEG-2 TS Based DVB Services over IP Based Networks (and associated XML)13
[25] Medhi Deep, Ramasamy Karthik, (2018), Network Routing (Second Edition) https://www.sciencedirect.com/book/9780128007372
[26] Whelan G., Linux.com (2018), Software Defined Networking Fundamentals Part 1: Intro to Networking Planes14
[27] ISO/IEC TR 30164, Internet of Things (IoT) — Edge Computing15
[28] ISO/IEC 11889-1:2015, Information Technology — Trusted Platform Module16
[29] ISO/IEC 27701, Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines17
[30] ISO/TR 24097-3:2019, Intelligent transport systems — Using web services (machine-machine delivery) for ITS service delivery — Part 3: Quality of service
[31] ISO/IEC TR 21890:2001, Information technology — Telecommunications and information exchange between systems — Interoperation of PISNs with IP networks
[32] ISO/IEC 2382:2015, Information technology — Vocabulary

ISO/IEC TR 23613:2020

Information technology — Cloud computing — Cloud service metering elements and billing modes
https://www.iso.org/standard/76404.html

ISO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 17789, Information technology — Cloud computing — Reference architecture

Bibliography

[1] ISO/IEC 19086-1:2016, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
[2] ISO/IEC 19086-2:2018, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
[3] ISO/IEC 19086-3:2017, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 3: Core conformance requirements
[4] ISO/IEC 19086-4:2019, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 4: Security and privacy

ISO/IEC TR 23951:2020

Information technology — Cloud computing — Guidance for using the cloud SLA metric model
https://www.iso.org/standard/77453.html

ISO/IEC 17788, Information technology — Cloud computing — Overview and vocabulary
ISO/IEC 17789, Information technology — Cloud computing — Reference architecture
ISO/IEC 19086-1, Information technology — Cloud computing — Service level agreement (SLA) framework — Part 1: Overview and concepts
ISO/IEC 19086-2, Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model

Bibliography

[1] ISO/IEC 19086-4, Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII1
[2] ISO/IEC TR 22678, Information technology — Cloud computing — Guidance for policy development2

ISO/IEC TS 5928

Information technology — Cloud computing and distributed platforms — Taxonomy for digital platforms
https://www.iso.org/standard/81848.html

ISO/IEC FDIS 5140

Information technology — Cloud computing — Concepts for multi-cloud and the use of multiple cloud services
https://www.iso.org/standard/80910.html

ISO/IEC AWI TS 7339

Cloud computing and distributed platforms — Cloud computing — Platform capabilities type and Platform as a Service (PaaS)
https://www.iso.org/standard/82756.html

ISO/IEC AWI TR 10822-1

Cloud computing — Multi-cloud management — Part 1: Overview and use cases
https://www.iso.org/standard/83756.html

ISO/IEC AWI TS 10866

Information technology — Cloud computing and distributed platforms — Framework and concepts for organizational autonomy and digital sovereignty
https://www.iso.org/standard/83757.html

ISO/IEC 22123-3

Information technology — Cloud computing — Part 3: Reference architecture
https://www.iso.org/standard/82759.html

ISO/IEC 22123-2

Information technology — Cloud computing — Part 2: Concepts
https://www.iso.org/standard/80351.html

0
0
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?