{"id":444120,"date":"2024-10-20T08:36:10","date_gmt":"2024-10-20T08:36:10","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2866-1-2023-2\/"},"modified":"2024-10-26T16:02:51","modified_gmt":"2024-10-26T16:02:51","slug":"ieee-2866-1-2023-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2866-1-2023-2\/","title":{"rendered":"IEEE 2866.1-2023"},"content":{"rendered":"
New IEEE Standard – Active. The software architecture of a device trusted extension system (DTX) is described in a hierarchal way, the security components to the layers are mapped, and the security components are defined by this document.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 2866.1\u2122-2023 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Word usage 2.\u2002Normative references <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.\u2002Definitions, acronyms, and abbreviations 3.1\u2002Definitions 3.2\u2002Acronyms and abbreviations 4.\u2002Device operational risk analysis 4.1\u2002Principles and methodology for operational risk ranking 4.2\u2002Examples of generic risk assessment methodologies 5.\u2002Software architecture of Device Trusted Extension <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6.\u2002Device trusted extension (DTX) component capability requirements 6.1\u2002Overview 6.2\u2002Software system capability requirements <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.3\u2002Software application capability requirements 6.4\u2002Identity capability requirements 6.5\u2002The risk control interface provided by DTX <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.\u2002Device trusted extension (DTX) security protection requirements 7.1\u2002Basic security requirements for DTX model 7.2\u2002Security requirements of the system environment for DTX model <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Annex\u00a0A (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Device Trusted Extension: Software Architecture (Approved Draft)<\/b><\/p>\n |