{"id":231124,"date":"2024-10-19T15:02:56","date_gmt":"2024-10-19T15:02:56","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-cen-iso-ts-174192014\/"},"modified":"2024-10-25T09:20:33","modified_gmt":"2024-10-25T09:20:33","slug":"bsi-pd-cen-iso-ts-174192014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-cen-iso-ts-174192014\/","title":{"rendered":"BSI PD CEN ISO\/TS 17419:2014"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Section sec_1 Section sec_2 Section sec_3 Section sec_3.1 Section sec_3.2 1\tScope 2\tNormative references 3\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Section sec_3.3 Section sec_3.4 Section sec_3.5 Section sec_3.6 Section sec_3.7 Section sec_3.8 Section sec_3.9 Section sec_3.10 Section sec_3.11 Section sec_3.12 Section sec_3.13 Section sec_3.14 Section sec_3.15 <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Section sec_3.16 Section sec_3.17 Section sec_3.18 Section sec_3.19 Section sec_3.20 Section sec_3.21 Section sec_3.22 Section sec_3.23 Section sec_3.24 Section sec_3.25 Section sec_3.26 Section sec_3.27 Section sec_3.28 <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Section sec_3.29 Section sec_3.30 Section sec_4 4\tAbbreviated terms <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Section sec_5 Section sec_5.1 Table tab_1 5\tApplication management 5.1\tIntroduction <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Section sec_5.2 5.2\tITS communications architecture <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Figure fig_1 Section sec_5.3 Section sec_5.4 Section sec_5.5 Section sec_5.5.1 5.3\tPKI architecture 5.4\tRegulations and policies 5.5\tITS station <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Figure fig_2 <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Section sec_5.5.2 Section sec_5.5.3 Section sec_5.6 Section sec_5.6.1 5.6\tApplications and messages <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Section sec_5.6.2 Section sec_5.6.3 Section sec_5.7 Section sec_5.7.1 5.7\tCommunications <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Table tab_2 Section sec_5.7.2 Section sec_5.7.3 Section sec_5.8 Table tab_3 5.8\tIdentifiers and addresses summary <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Section sec_6 Section sec_6.1 6\tGCMA organizational framework 6.1\tOverview <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Section sec_6.2 Figure fig_3 6.2\tRegistration of globally unique identifiers <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Figure fig_4 Section sec_6.3 6.3\t\u200bCertification of ITS-S equipment <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Figure fig_5 Section sec_6.4 6.4\t\u200bCertification of ITS-S application processes <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Figure fig_6 Section sec_6.5 Figure fig_7 6.5\tIssuance of ITS-SCU certificates <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Section sec_6.6 Figure fig_8 Section sec_6.7 Figure fig_9 6.6\tIssuance of certificates for real-time operation 6.7\tITS application repository <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Section sec_6.8 Section sec_6.9 Section sec_6.9.1 Section sec_6.9.2 Table tab_4 Section sec_6.9.3 6.8\tSecure installation and maintenance of facilities and communication protocols 6.9\tRegistries <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Table tab_5 Section sec_6.9.4 Table tab_6 Section sec_6.9.5 Table tab_7 <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Section sec_6.9.6 Table tab_8 Section sec_6.9.7 Table tab_9 Section sec_6.9.8 Table tab_10 Section sec_6.9.9 <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Table tab_11 Section sec_6.9.10 Table tab_12 Section sec_6.9.11 Table tab_13 Section sec_6.9.12 Table tab_14 Section sec_6.9.13 <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Table tab_15 Section sec_6.9.14 Table tab_16 Section sec_6.9.15 Table tab_17 Section sec_6.9.16 Table tab_18 Section sec_6.9.17 <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Section sec_6.9.18 Section sec_6.10 Section sec_7 Section sec_7.1 Section sec_7.1.1 Section sec_7.1.2 6.10\tWrong behaviour reporting 7\tGCMA technical framework 7.1\tAddresses and identifiers <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Figure fig_10 Section sec_7.1.3 Section sec_7.1.4 <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Table tab_19 Section sec_7.1.5 Section sec_7.1.6 Section sec_7.1.7 <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Section sec_7.1.8 Section sec_7.1.9 Section sec_7.1.10 Section sec_7.1.11 Section sec_7.1.12 Section sec_7.1.13 Section sec_7.1.14 <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Section sec_7.1.15 Section sec_7.1.16 Section sec_7.1.17 Section sec_7.1.18 Section sec_7.2 Section sec_7.2.1 Section sec_7.2.2 Section sec_7.2.3 7.2\tOnline management <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Section sec_7.2.4 Section sec_7.2.5 Section sec_7.2.6 <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex sec_A Annex sec_A.1 Annex sec_A.2 Annex\u00a0A \n(normative)<\/p>\n ASN.1 modules <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex sec_A.3 <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Annex sec_A.4 <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Reference ref_5 Reference ref_6 Reference ref_7 Reference ref_8 Reference ref_9 Reference ref_10 Reference ref_11 Reference ref_12 Reference ref_13 Reference ref_14 Reference ref_15 Reference ref_16 Reference ref_17 Bibliography <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Reference ref_18 Reference ref_19 <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Intelligent transport systems. Cooperative systems. Classification and management of ITS applications in a global context<\/b><\/p>\n |