{"id":347707,"date":"2024-10-20T00:27:34","date_gmt":"2024-10-20T00:27:34","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-20-30409280-dc-2019\/"},"modified":"2024-10-25T23:58:53","modified_gmt":"2024-10-25T23:58:53","slug":"bsi-20-30409280-dc-2019","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-20-30409280-dc-2019\/","title":{"rendered":"BSI 20\/30409280 DC 2019"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
3<\/td>\n | HORIZONTAL_STD FUNCTION_EMC FUNCTION_ENV FUNCTION_QUA FUNCTION_SAFETY <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 4 Symbols (and abbreviated terms) 5 Characteristics specific to IoT systems and services <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6 Considerations necessary and specific to IoT systems and services 6.1 Introduction to the Trustworthiness of IoT systems <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.2 Examples of risks specific to IoT systems and services <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7 Processes for implementing and maintaining trustworthiness 7.1 General 7.2 Agreement processes 7.2.1 Acquisition process <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.2.2 Supply process 7.3 Organizational project-enabling processes 7.3.1 Life cycle model management process 7.3.2 Infrastructure management process 7.3.3 Portfolio management process <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7.3.4 Human resource management process 7.3.5 Quality management process 7.3.6 Knowledge management process 7.4 Technical management processes 7.4.1 Project planning process 7.4.2 Project assessment and control process <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 7.4.3 Decision management process 7.4.4 Risk management process <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.4.5 Configuration management process 7.4.6 Information management process <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.4.7 Measurement process 7.4.8 Quality assurance process 7.5 Technical processes 7.5.1 Business or mission analysis process 7.5.2 Stakeholder needs and requirement definition process <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.5.3 System requirements definition process <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.5.4 Architecture definition process <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.5.5 Design definition process <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.5.6 System analysis process 7.5.7 Implementation process <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.5.8 Integration process 7.5.9 Verification process <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.5.10 Transition process <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 7.5.11 Validation process <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.5.12 Operation process 7.5.13 Maintenance process <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 7.5.14 Disposal process <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex\u00a0A (informative) Overview of processes and its application A.1 Overview of approach toward process for trustworthiness <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | A.2 Application of process to enhance trustworthiness <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 30147. Internet of Things (IoT). Integration of IoT trustworthiness activities in ISO\/IEC\/IEEE 15288 systems engineering processes<\/b><\/p>\n |