{"id":444120,"date":"2024-10-20T08:36:10","date_gmt":"2024-10-20T08:36:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2866-1-2023-2\/"},"modified":"2024-10-26T16:02:51","modified_gmt":"2024-10-26T16:02:51","slug":"ieee-2866-1-2023-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2866-1-2023-2\/","title":{"rendered":"IEEE 2866.1-2023"},"content":{"rendered":"

New IEEE Standard – Active. The software architecture of a device trusted extension system (DTX) is described in a hierarchal way, the security components to the layers are mapped, and the security components are defined by this document.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 2866.1\u2122-2023 Front cover <\/td>\n<\/tr>\n
2<\/td>\nTitle page <\/td>\n<\/tr>\n
4<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
10<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\nContents <\/td>\n<\/tr>\n
12<\/td>\n1.\u2002Overview
1.1\u2002Scope
1.2\u2002Word usage
2.\u2002Normative references <\/td>\n<\/tr>\n
13<\/td>\n3.\u2002Definitions, acronyms, and abbreviations
3.1\u2002Definitions
3.2\u2002Acronyms and abbreviations
4.\u2002Device operational risk analysis
4.1\u2002Principles and methodology for operational risk ranking
4.2\u2002Examples of generic risk assessment methodologies
5.\u2002Software architecture of Device Trusted Extension <\/td>\n<\/tr>\n
14<\/td>\n6.\u2002Device trusted extension (DTX) component capability requirements
6.1\u2002Overview
6.2\u2002Software system capability requirements <\/td>\n<\/tr>\n
15<\/td>\n6.3\u2002Software application capability requirements
6.4\u2002Identity capability requirements
6.5\u2002The risk control interface provided by DTX <\/td>\n<\/tr>\n
16<\/td>\n7.\u2002Device trusted extension (DTX) security protection requirements
7.1\u2002Basic security requirements for DTX model
7.2\u2002Security requirements of the system environment for DTX model <\/td>\n<\/tr>\n
18<\/td>\nAnnex\u00a0A (informative) Bibliography <\/td>\n<\/tr>\n
19<\/td>\nBack cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Device Trusted Extension: Software Architecture (Approved Draft)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2023<\/td>\n19<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":444124,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-444120","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/444120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/444124"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=444120"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=444120"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=444120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}