{"id":346601,"date":"2024-10-20T00:21:56","date_gmt":"2024-10-20T00:21:56","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-10746-32009\/"},"modified":"2024-10-25T23:49:30","modified_gmt":"2024-10-25T23:49:30","slug":"bs-iso-iec-10746-32009","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-10746-32009\/","title":{"rendered":"BS ISO\/IEC 10746-3:2009"},"content":{"rendered":"
This Recommendation | International Standard:<\/p>\n
defines how ODP systems are specified, making use of concepts in Rec. ITU-T X.902 | ISO\/IEC 10746-2;<\/p>\n<\/li>\n
identifies the characteristics that qualify systems as ODP systems.<\/p>\n<\/li>\n<\/ul>\n
It establishes a framework for coordinating the development of existing and future standards for ODP systems and is provided for reference by those standards.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
5<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards 2.2 Paired Recommendations | International Standards equivalent in technical content <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Definitions 3.1 Descriptive definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 3.2 Abbreviations 4 Framework <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.1 Viewpoints <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.2 ODP viewpoint languages 4.3 ODP functions 4.4 ODP distribution transparencies <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.5 Standards derived from the framework <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4.6 Conformance 5 Enterprise language 5.1 Concepts 5.2 Structuring rules <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.3 Conformance and reference points 6 Information language <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.1 Concepts 6.2 Structuring rules 6.3 Conformance and reference points <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7 Computational language 7.1 Concepts <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.2 Structuring rules <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.3 Conformance and reference points 8 Engineering language <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 8.1 Concepts <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 8.2 Structuring rules <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8.3 Conformance and reference points <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 9 Technology language 9.1 Concepts 9.2 Structuring rules 9.3 Conformance and reference points 10 Consistency rules <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 10.1 Computational and information specification correspondences 10.2 Engineering and computational specification correspondences <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 10.3 Technology and engineering specification correspondences 11 ODP functions <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 12 Management functions 12.1 Node management function <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 12.2 Object management function 12.3 Cluster management function <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 12.4 Capsule management function <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 13 Coordination functions 13.1 Event notification function 13.2 Checkpoint and recovery function <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 13.3 Deactivation and reactivation function <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 13.4 Group function 13.5 Replication function 13.6 Migration function <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 13.7 Transaction function 13.8 ACID transaction function <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 13.9 Engineering interface reference tracking function 14 Repository functions 14.1 Storage function 14.2 Information organization function <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 14.3 Relocation function 14.4 Type repository function <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 14.5 Trading function 15 Security functions 15.1 Concepts <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 15.2 Access control function 15.3 Security audit function 15.4 Authentication function <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 15.5 Integrity function 15.6 Confidentiality function 15.7 Non-repudiation function <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 15.8 Key management function 16 ODP distribution transparency <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 16.1 Access transparency 16.2 Failure transparency <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 16.3 Location transparency 16.4 Migration transparency 16.5 Persistence transparency 16.6 Relocation transparency <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 16.7 Replication transparency 16.8 Transaction transparency <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Annex A \u2013 Formal computational supertype\/subtype rules A.1 Notations and conventions A.2 Type system <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | A.3 Signal interface signature types <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | A.4 Operation interface signature types A.5 Stream interface types A.6 Example <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | Annex B \u2013 Human-computer interactions B.1 Specifying human\/system interactions <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Open distributed processing. Reference model: Architecture<\/b><\/p>\n |