{"id":423873,"date":"2024-10-20T06:48:55","date_gmt":"2024-10-20T06:48:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-ts-178752022\/"},"modified":"2024-10-26T12:47:47","modified_gmt":"2024-10-26T12:47:47","slug":"bsi-pd-cen-ts-178752022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-ts-178752022\/","title":{"rendered":"BSI PD CEN\/TS 17875:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols and abbreviations <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 Conformance 6 Phases of the ISIS 6.1 Summary of phases <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6.2 Phase 1: Instigation <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.3 Phase 2: Initiation 6.3.1 Nature of the Communication ISO 5616 \u201cITS Secure Interface\u201d architecture 6.3.2 Architectural Foundation of the \u201cSecure ITS Data Management and Access Interface\u201d <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.3.3 Global Transport Data Format <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.3.4 ISIS in the context of the Secure Interface for data access <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.3.5 Security Authentication <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.3.6 Call establishment 6.4 Phase 3: Multiple Provider Management <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.5 Phase 4: Establish capability 6.6 Phase 5: Search and offering 6.7 Phase 6: Data\/service provision 6.8 Phase 7: Shutdown provisions 6.9 Phase 8: Terminate ISIS <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7 Service Provision Architecture <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Intelligent transport systems. eSafety. Incident Support. Information System (ISIS) Architecture<\/b><\/p>\n |