id stringlengths 7 13 | title stringlengths 26 396 | type stringclasses 2
values | version stringclasses 152
values | url stringlengths 90 98 | scope stringlengths 0 9.03k |
|---|---|---|---|---|---|
104 021-1 | ODN Quick Construction and Digitalization; Part 1: General and Guidance | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/10402101/01.01.01_60/ts_10402101v010101p.pdf | The present document describes the general guidance on Optical Distribution Network (ODN) quick construction and digitalization. The digitalized Quick ODN enables the carriers to improve the fibre deployment efficiency, achieve digital resource management, and consequently improve the operation and management efficiency. The present document describes the composition of the digitalized quick ODN and the general requirements on physical label, digitalized quick ODN devices, intelligent management terminal, intelligent optical path analysis equipment and intelligent management system. The present document is mainly based on intelligent optical distribution networks that can collect the ODN device information through intelligent optical path analysis equipment or intelligent management terminal (such as a smart phone with the ODN management application). It can also be used as a reference for other networks with optical fibre connections. For optical distribution networks that collect label information in other methods, it is possible to refer to the present document similarly. |
104 022 | Transport and Traffic Telematics (TTT); Dedicated Short Range Communication (DSRC) transmission equipment (500 kbit/s / 250 kbit/s) operating in the 5 795 MHz to 5 815 MHz frequency band; performance tests | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104022/01.01.01_60/ts_104022v010101p.pdf | The present document defines the performance test cases for Dedicated Short Range Communication (DSRC) transmission equipment (500 kbit/s / 250 kbit/s) operating in the 5 795 MHz to 5 815 MHz frequency band. NOTE: Technical requirements for conformance against article 3.2 of the Radio Equipment Directive [i.1] and related test procedures are defined in in ETSI EN 300 674-2-1 [i.2] and ETSI EN 300 674-2-2 [i.3]. |
104 023 | Publicly Available Specification (PAS); O-RAN Fronthaul Management Plane Specification v17.01; (O-RAN.WG4.TS.MP.0-R004-v17.01) | TS | 17.1.0 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104023/17.01.00_60/ts_104023v170100p.pdf | The present document specifies the management plane protocols used over the fronthaul interface linking the O-RAN Radio Unit (O-RU) with other management plane entities, that may include the O-RAN Distributed Unit (O-DU), the O-RAN defined Service Management and Orchestration (SMO) functionality as well as other generic Network Management Systems (NMS). |
104 025 | Digital Video Broadcasting (DVB); Service discovery and delivery protocols for a DVB Home Broadcast system | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104025/01.01.01_60/ts_104025v010101p.pdf | The present document defines the interfaces through which a DVB-HB Local Server can redistribute broadcast signals and associated metadata to DVB-HB Clients and specifies mechanisms allowing a DVB-HB Local Server to announce its presence on the LAN and its capabilities, and a DVB-HB Client to discover it. It includes backwards-compatible extensions to the SAT>IP and DVB-I specifications. |
104 027 | User-Centric Approach in the digital ecosystem; The User Information System and Smart Customized Services; Concept, definition and services | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104027/01.01.01_60/tr_104027v010101p.pdf | The present document presents an analysis of the user expectations, with respect to the study of data driven technologies (Artificial Intelligence (AI), deep learning, Machine Learning (ML)) to present the definition and concept of the User Information System (UIS), that enables Smart Customized Services (SCS) from both user and provider side. These services aim to provide personalization, adaptability, and intelligent decision support within the digital ecosystem. NOTE: The UIS and SCS are designed to serve a broad spectrum of users. Their objective is to empower and protect all citizens. By integrating smart and assistive technologies, the system seeks to enhance participation in public, social, and economic activities, while also offering advanced users more autonomy and self-management capabilities. |
104 030 | Securing Artificial Intelligence (SAI); Critical Security Controls for Effective Cyber Defence; Artificial Intelligence Sector | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104030/01.01.01_60/tr_104030v010101p.pdf | The present document applies the latest version of the Critical Security Controls [i.5] and risk measurement tools [i.6] for effective risk control and enhanced resilience of the AI sector together with other industry AI controls. |
104 031 | Securing Artificial Intelligence (SAI); Collaborative Artificial Intelligence | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104031/01.01.01_60/tr_104031v010101p.pdf | The present document describes collaborative Artificial Intelligence (AI) from securing AI perspectives. Collaborative AI could take place among AI agents, between AI agents and human, and even among people who provide and use AI. As such, the security and performance of collaborative AI may range from AI/ML-specific issues to other system- specific issues (e.g. AI-to-AI communications, joint computing and communicating optimization, etc.). The present document investigates collaborative AI use cases and involved technical aspects, and analyses potential security and performance issues (e.g. AI-to-AI communications, trustworthy collaboration, etc.) among those AI-related entities. The present document also overviews existing approaches to tackle and/or mitigate these issues. |
104 032 | Securing Artificial Intelligence (SAI); Traceability of AI Models | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104032/01.01.01_60/tr_104032v010101p.pdf | The present document describes the role of traceability in the challenge of Securing AI and explores issues related to sharing and re-using models across tasks and industries. The scope includes threats, and their associated remediations where applicable, to ownership rights of AI creators as well as to verification of models origin. Mitigations can be non- AI-Specific (Digital Right Management applicable to AI) and AI-specific techniques (e.g. ML watermarking) from prevention and detection phases. They can be both model-agnostic and model enhancement techniques. The present document aligns terminology with existing ETSI ISG SAI documents and studies, and references/complements previously studied attacks and remediations (ETSI GR SAI 004 [i.2] and ETSI GR SAI 005 [i.3]). It also gathers industrial and academic feedback on traceability and ownership rights protection and model verification in the context of AI. |
104 034 | Cyber Security (CYBER); Software Bill of Materials (SBOM) Compendium | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104034/01.01.01_60/tr_104034v010101p.pdf | The present document identifies Software Bill of Material challenges, types, existing specifications, existing tools and cybersecurity uses, including compliance obligations (e.g. regulatory or contractual). The present document identifies gaps and makes recommendations for further work. |
104 036 | Publicly Available Specification (PAS); O-RAN Use Case Detailed Specification; (O-RAN.WG1.Use-Cases-Detailed-Specification-R003-v12.00) | TS | 12.0.0 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104036/12.00.00_60/ts_104036v120000p.pdf | The present document specifies the top-level use cases as defined by O-RAN WG1 UCTG (Use Case Task Group). For each use case, the document describes the motivation, resources, steps involved, and the data requirements. These top-level use cases are further detailed in relevant WGs along with the requirements for O-RAN components and their interfaces. |
104 037 | Publicly Available Specification (PAS); O-RAN Use Cases Analysis Report (O-RAN.WG1.Use-Cases-Analysis-Report-R003-v12.00) | TR | 12.0.0 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104037/12.00.00_60/tr_104037v120000p.pdf | The present document specifies potential O-RAN use cases as defined by O-RAN WG1 UCTG (Use Case Task Group). The use cases are described at a very high level, emphasizing how the use is enabled by O-RAN architecture along with basic input data expectations and resulting actions. These high level use cases are prioritized within O-RAN, and selected use cases are further detailed in O-RAN WG1 UCTG and relevant O-RAN WGs to define the requirements for O-RAN components and their interfaces. |
104 038 | Publicly Available Specification (PAS); E2 interface: General Aspects and Principles (O-RAN.WG3.E2GAP-R003-v04.01) | TS | 4.1.0 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104038/04.01.00_60/ts_104038v040100p.pdf | The present document describes the general aspects and principles of the E2 interface between Near-RT RIC and one or more E2 Nodes, including the interaction with applications hosted in the Near-RT RIC. |
104 039 | Publicly Available Specification (PAS); E2 interface: Application Protocol (O-RAN.WG3.E2AP-R003-v04.00) | TS | 4.0.0 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104039/04.00.00_60/ts_104039v040000p.pdf | The present document specifies the Near-RT RIC layer signalling protocol for the E2 interface. The E2 interface provides means for interconnecting a Near-RT RIC and an E2 Node. The E2 Application Protocol (E2AP) supports the functions of E2 interface by signalling procedures defined in the present document. E2AP is developed in accordance with the general principles stated in ETSI TS 104 038 [2]. |
104 040 | Publicly Available Specification (PAS); E2 interface: Service Model (O-RAN.WG3.E2SM-R003-v04.00) | TS | 4.0.0 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104040/04.00.00_60/ts_104040v040000p.pdf | The present document describes the O-RAN specified RAN Function-specific Service Models supported over E2 (E2SM) and specifies the common elements for use in E2 service models. |
104 041 | Publicly Available Specification (PAS); O-RAN Slicing Architecture; (O-RAN.WG1.Slicing-Architectue-R003-v11.00) | TS | 11.0.0 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104041/11.00.00_60/ts_104041v110000p.pdf | The present document specifies the high level O-RAN slicing related use cases, requirements and architecture. While some of the requirements are derived from use cases, some of the relevant SDO requirements are captured as they have impact on O-RAN functions. Along with requirements and reference slicing architecture, slicing related impact to O-RAN functions and interfaces are captured as well. |
104 043 | Publicly Available Specification (PAS); O-RAN Operations and Maintenance Interface Specification (O-RAN.WG10.O1-Interface-R003-v11.00) | TS | 11.0.0 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104043/11.00.00_60/ts_104043v110000p.pdf | The present document defines O-RAN OAM interface functions and protocols for the O-RAN O1 interface. The present document studies the functions conveyed over the interface, including management functions, procedures, operations, and corresponding solutions, and identifies existing standards and industry work that can serve as a basis for O-RAN work. |
104 047-1 | DECT-2020 New Radio (NR); Conformance Test Specification; Part 1: Radio Transmission and Reception | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/10404701/01.01.01_60/ts_10404701v010101p.pdf | The present document is one of the parts of the radio conformance test specification for DECT-2020 New Radio (NR) radio device. The present document specifies radio device radio transmission and reception conformance testing based on [2] and [3]. Further, the present document defines the test conditions, test configurations, and requirement for testing functions and a test system, to be used for radio transmission and reception conformance testing. |
104 047-2 | DECT-2020 New Radio (NR); Conformance Test Specification; Part 2: Radio Protocols | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/10404702/01.01.01_60/ts_10404702v010101p.pdf | The present document is one of the parts of the radio conformance test specifications of the DECT-2020 New Radio (NR) radio device. The present document specifies radio device protocol conformance testing including Medium Access (MAC), Data Link Control (DLC) and Convergence Layer (CVG) protocol layers. Further the present document defines the test conditions, test configurations, and requirement for testing functions and a test system, to be used for protocol conformance testing. |
104 048 | Securing Artificial Intelligence (SAI); Data Supply Chain Security | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104048/01.01.01_60/tr_104048v010101p.pdf | The present document addresses the security problems arising from data supply chains in in the development of Artificial Intelligence (AI) and Machine Learning (ML) systems. Data is a critical component in the development of AIML systems. Compromising the integrity of data has been demonstrated to be a viable attack vector against such systems (see clause 4). The present document summarizes the methods currently used to source data for training AI, along with a review of existing initiatives for developing data sharing protocols. It then provides a gap analysis on these methods and initiatives to scope possible requirements for standards for ensuring integrity and confidentiality of the shared data, information and feedback. The present document relates primarily to the security of data, rather than the security of models themselves. It is recognized, however, that AI supply chains can be complex and that models can themselves be part of the supply chain, generating new data for onward training purposes. Model security is therefore influenced by, and in turn influences, the security of the data supply chain. Mitigation and detection methods can be similar for data and models, with poisoning of one being detected by analysis of the other. The present document focuses on security; however, data integrity is not only a security issue. Techniques for assessing and understanding data quality for performance, transparency or ethics purposes are applicable to security assurance too. An adversary aim can be to disrupt or degrade the functionality of a model to achieve a destructive effect. The adoption of mitigations for security purposes will likely improve performance and transparency, and vice versa. The present document does not discuss data theft, which can be considered a traditional cybersecurity problem. The focus is instead specifically on data manipulation in, and its effect on, AI/ML systems. |
104 050 | Securing Artificial Intelligence (SAI); AI Threat Ontology and definitions | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104050/01.01.01_60/ts_104050v010101p.pdf | The present document defines what an Artificial Intelligence (AI) threat is and defines how it can be distinguished from any non-AI threat. The model of an AI threat is presented in the form of an ontology to give a view of the relationships between actors representing threats, threat agents, assets and so forth and defines those terms (see also [1]). The ontology in the present document extends from the base taxonomy of threats and threat agents described in ETSI TS 102 165-1 [2] and addresses the overall problem statement for SAI presented in ETSI TR 104 221 [i.21] and the mitigation strategies described in ETSI TR 104 222 [i.22]. Note that, although both technical reports are listed in clause 2.2, they are indeed essential for understanding the scope of the present document. NOTE 1: The ontology described in the present document applies to AI both as a threat agent and as an attack target. NOTE 2: The present document extends the content of ETSI GR SAI 001 [i.20], and retains significant elements of its content where relevant for clarity. |
104 051 | Securing Artificial Intelligence (SAI); Security aspects of using AI/ML techniques in telecom sector | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104051/01.01.01_60/tr_104051v010101p.pdf | The use of AI to facilitate the use cases may cause AI security and privacy issues specific to the telecom industry. The scope of this proposed work item will be to investigate security and privacy issues related to the use of AI in the telecom industry sector. Harmonisation with 3GPP work in SA1, SA2, and SA3 is anticipated. Key AI use cases in telecom networks are (non-exhaustive list): • Network as a service. • Network optimization. • Network planning and upgrades. • Automating security operations (anomaly detection, planning mitigation and response). This investigation may use but is not limited to the Network Operations Lifecycle Phases methodology. |
104 052 | System Reference document (SRdoc); Short Range Devices; Radar equipment operating in the 76 GHz to 77 GHz range; additional applications | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104052/01.01.01_60/tr_104052v010101p.pdf | The present document describes applications for SRDs in the 76 - 77 GHz which may require a change in the present regulatory framework for the proposed band. It includes in particular: • Market information; • Technical information regarding equipment type and typical installation; • Regulatory issues. For the applications described, the intended and unwanted emissions are within the current harmonized regulations for SRDs. The regulatory changes that would be required for their realization are relaxations on usage restrictions. |
104 053-1 | TETRA Air Interface Security, Algorithms Specifications; Part 1: TETRA Encryption Algorithms, TEA Set A | TS | 1.2.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/10405301/01.02.01_60/ts_10405301v010201p.pdf | The present document specifies the Terrestrial Trunked Radio system (TETRA) set A encryption algorithms TEA1, TEA2, TEA3 and TEA4. The TETRA Air interface security function provides mechanisms for confidentiality of control signalling and user speech and data at the air interface, authentication and key management mechanisms for the air interface and for the Inter-System Interface (ISI). TETRA Air Interface security mechanisms are described in the TETRA V+D security specification [1] and the TETRA Direct Mode security specification [2]. |
104 053-2 | TETRA Air Interface Security, Algorithms Specifications; Part 2: TETRA Encryption Algorithms, TEA Set B | TS | 1.2.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/10405302/01.02.01_60/ts_10405302v010201p.pdf | The present document specifies the Terrestrial Trunked Radio system (TETRA) set B encryption algorithms TEA 5, 6 and 7. These algorithms are designed to meet the requirements set out in the requirements specification for the Additional TETRA Encryption Algorithm Suite [i.2]. The TETRA Air interface security function provides mechanisms for confidentiality of control signalling and user speech and data at the air interface, authentication and key management mechanisms for the air interface and for the Inter-System Interface (ISI). TETRA Air Interface security mechanisms are described in the TETRA V+D security specification [1] and the TETRA Direct Mode security specification [2]. |
104 053-3 | TETRA Air Interface Security, Algorithms specification; Part 3: TETRA and Authentication and Key Management Algorithms TAA1 | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/10405303/01.01.01_60/ts_10405303v010101p.pdf | The present document consists of a specification for a set of algorithms TAA1 which may be used in authentication and key management mechanisms for the Terrestrial European Trunked Radio (TETRA). TAA1 is an acronym for "TETRA Authentication and Key Management Algorithms set 1". These specifications are detailed in clause 5. The present document includes addenda 1, 2 and 3 of the algorithm specifications which adds some algorithms and corrects errors in the original V.1 specification. The block cipher that is used for this TAAl set is the HURDLE-II algorithm. This is described in the present document at clause 6. |
104 053-4 | TETRA Air Interface Security, Algorithms Specifications; Part 4: TETRA Authentication and Key Management
Algorithms TAA2 | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/10405304/01.01.01_60/ts_10405304v010101p.pdf | The present document specifies each algorithm in the suite of authentication and key management algorithms TAA2, each designed to meet the requirements set out in the requirements specification [i.1]. |
104 060 | Human Factors (HF); Guidance on how to apply the EN 301 549 to digital television products | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104060/01.01.01_60/tr_104060v010101p.pdf | The present document describes the application of accessibility requirements as listed in ETSI EN 301 549 [i.1] herein called "ETSI EN 301 549 [i.1]" to TVs. The focus is on the device capability rather than the whole digital TV field. The scope excludes content provision and delivery. |
104 062 | Securing Artificial Intelligence; Automated Manipulation of Multimedia Identity Representations | TR | 1.2.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104062/01.02.01_60/tr_104062v010201p.pdf | The present document covers AI-based techniques for automatically manipulating existing or creating fake identity data represented in different media formats, such as audio, video and text (deepfakes). The present document describes the different technical approaches and analyses the threats posed by deepfakes in different attack scenarios. It then provides technical and organizational measures to mitigate these threats and discusses their effectiveness and limitations. |
104 063 | Speech and multimedia Transmission Quality (STQ); A nonlinearity measure for distortion analysis of speech communication terminals | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104063/01.01.01_60/ts_104063v010101p.pdf | The present document specifies a signal-based analysis method and overall measure for linearity of electrical or acoustical recordings that were transmitted via speech communication terminals. The analysis considers the influence of the full transmission paths (talker to POI and POI to listener), including acoustical paths and components like signal processing and/or speech/audio codecs. The method specified in the present document is intended to be used for (but not limited to) communication terminals, which are optimized for the transmission of speech/audio signals - but may at the same time significantly distort or even suppress artificial test signals like e.g. sweeps, noise bursts or single-/multi-sine tones, as these are identified as irrelevant or even unwanted signal components. For this reason, source signals that do not correspond to the envisioned use case of the terminal are out of scope. The method specified in the present document is intended to be used mainly as a technical measure and in a similar way as traditional distortion measures. These assume a mostly linear and time-invariant behaviour of the device under test and are typically used for e.g. detecting defective transducers (e.g. loudspeakers or microphones). Even though a certain correlation can be anticipated, any relation to perceptual quality (independent if assessed auditorily and/or instrumentally) is out of scope. The specified method requires a sufficiently low idle noise floor in the analysed signals. Usage under ambient noise conditions is out of scope. |
104 065 | Securing Artificial Intelligence (SAI); AI Act mapping and gap analysis to ETSI workplan | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104065/01.01.01_60/tr_104065v010101p.pdf | The present document provides an analysis of the standardization requirements of the AI Act [i.1] against the workplan of ETSI (across all TBs) in order to identify gaps and the means to fill them. NOTE: The present document is a Technical Report and contains no requirements, however the text does contain quotes from the AI Act [i.1] where mandates are stated, but where quoted these have no normative effect. |
104 066 | Securing Artificial Intelligence (SAI); Security Testing of AI | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104066/01.01.01_60/tr_104066v010101p.pdf | The present document identifies methods and techniques that are appropriate for security testing of ML-based components. Security testing of AI does not end at the component level. As for testing of traditional software, the integration with other components of a system needs to be tested as well. However, integration testing is not the subject of the present document. The present document addresses: • security testing approaches for AI; • security test oracles for AI; • definition of test adequacy criteria for security testing of AI. Techniques of each of these topics should be applied together to security test of a ML component. Security testing approaches are used to generate test cases that are executed against the ML component. Security test oracles enable to calculate a test verdict to determine if a test case has passed, that is, no vulnerability has been detected, or failed, that is a vulnerability has been identified. Test adequacy criteria are used to determine the entire progress and can be employed to specify a stop condition for security testing. |
104 067 | Securing Artificial Intelligence (SAI); Proofs of Concepts Framework | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104067/01.01.01_60/tr_104067v010101p.pdf | The present document provides information about the "lightweight" framework to be used by ETSI TC SAI to create multi-partner Proofs of Concepts (PoCs). |
104 071 | Cyber Security (CYBER); Mapping of the Consumer Mobile Device Protection Profile security requirements to the CRA essential cybersecurity requirements | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104071/01.01.01_60/tr_104071v010101p.pdf | The present document provides a mapping between the Consumer Mobile Device Protection Profile (CMDPP) in the ETSI TS 103 732 series ([i.2], [i.3], [i.4], [i.5], [i.6] and [i.7]) security requirements and the essential cybersecurity requirements from the Annexes of the Cyber Resilience Act (CRA) [i.1]. The present document will also analyse the gaps between the CMDPP ([i.2], [i.3], [i.4], [i.5], [i.6] and [i.7]) (if any) and the CRA [i.1], considering how to address them where necessary. |
104 072 | Intelligent Transport Systems (ITS); Facilities Layer; Parking Information Service; Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104072/02.01.01_60/ts_104072v020101p.pdf | The present document specifies a facility layer service for providing parking space availability and intention information from vehicular ITS-Stations to other ITS-Stations. |
104 073 | Intelligent Transport Systems (ITS); Facilities layer; Radio Resource Management Study; Release 2 | TR | 2.2.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104073/02.02.01_60/tr_104073v020201p.pdf | The present document identifies Resource Management (RM) at the Facilities Layer in relation to critical control requirements, capabilities, principles and parameters which could enable the definition of a mechanism supporting highly time and size dynamic data exchanging message services to operate robust, interoperable and backward compatible with existing ITS Release 1 and upcoming Release 2 message services in the 5,9 GHz ITS allocated band. |
104 074 | Core Network and Interoperability Testing (INT); Methodologies for Testing & Validation of Network Application based services over 5G networks | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104074/01.01.01_60/tr_104074v010101p.pdf | The present document provides recommendations on methodologies for testing and validation of Network Application based services over 5G networks. The present document includes recommendations covering the aspects of a Network Application validation framework by providing definitions of 5G relevant KPIs for Network Applications, the application and network functions making up Network Applications, and the services composed of the Network Applications. Moreover, recommendations on the testing and validation environment, on involved processes, and, finally, on the design of the Network Applications and services under test. Such recommendations can be equally applicable to a wide range of Network Applications composed services, application cases and may also be applicable beyond 5G scenarios. |
104 077-1 | Human Factors (HF); Age Verification Pre-Standardization Study Part 1: Stakeholder Requirements | TR | 1.1.2 | http://www.etsi.org/deliver/etsi_tr/104000_104099/10407701/01.01.02_60/tr_10407701v010102p.pdf | The present document identifies stakeholder requirements for age verification. NOTE: The present document may assist in providing the groundwork for defining standards as outlined in the Digital Services Act [i.1]. Its purpose is to establish the foundation for developing European standards in age verification and protecting minors online. The present document presents the analysis of requirements of identified stakeholders in the age verification process for whom accurate age information is essential to their service access or to their business operation. |
104 077-2 | Human Factors (HF); Age Verification Pre-Standardization Study Part 2: Solutions and Standards Landscape | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/10407702/01.01.01_60/tr_10407702v010101p.pdf | The present document reviewed from a perspective of the stakeholder requirements identified in ETSI TR 104 077-1 [i.7] is a study of the landscape of international, regional and national existing solutions (identified in ETSI TR 104 077-1 [i.7]), approaches (frameworks/architecture) and standards for age verification in Europe. |
104 077-3 | Human Factors (HF); Age Verification Pre-Standardization Study Part 3 : Proposed Standardization Roadmap | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/10407703/01.01.01_60/tr_10407703v010101p.pdf | The present document elaborates a set of proposals for further definition of work items within the standardization community to address the requirements identified in ETSI TR 104 077-1 [i.1] against the gaps identified and summarized in ETSI TR 104 077-2 [i.2]. The present document is intended for the SDOs identified in the proposals for their further consideration. |
104 078 | System Reference document (SRdoc); Short Range Devices; Radar equipment operating in 57 GHz to 64 GHz and 76 GHz to 77 GHz for applications on drones | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104078/01.01.01_60/tr_104078v010101p.pdf | The present document describes SRD radar equipment operating in 57 - 64 GHz and 76 - 77 GHz for applications upon drones which may require a change in the present regulatory framework for the proposed band. It includes in particular: • Market information. • Technical information regarding equipment type and typical installation. • Regulatory issues. |
104 080 | Environmental Engineering (EE); Example of a Life Cycle Assessment (LCA) of a mobile phone | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104080/01.01.01_60/tr_104080v010101p.pdf | The present document aims to present an example of an objective and transparent Life Cycle Assessment (LCA) of a mobile phone. The present document will provide an example of an LCA of a mobile phone fully compliant with ETSI ES 203 199 [i.1]. The present document will be technically aligned with ITU-T L.Suppl.60. The present document can be read by anyone aiming for a better understanding of LCA of mobile phones. However, the present document is especially intended for LCA practitioners with a prior knowledge of ETSI ES 203 199 [i.1]. The purpose of the present document is to: • provide an example of an LCA of a mobile phone, aligned with the requirements of ETSI ES 203 199 [i.1] to ensure a sufficient quality of LCA studies of mobile phones; • harmonize the LCAs of mobile phones; • increase the credibility of LCAs of mobile phones; • increase the transparency and facilitate the interpretation of LCA studies of mobile phones; • facilitate the communication of LCA studies of mobile phones. Recognizing ETSI ES 203 199 [i.1] as reference, the present document will apply it for the LCA of a mobile phone. The present document is valid for all types of mobile phones. While ETSI ES 203 199 [i.1] defines a set of requirements which reflect the quality that practitioners should strive for, the present document does not contain any requirements. Comparisons of results from environmental assessments of mobile phones which have been performed by different organizations and with different tools, are beyond the scope of ETSI ES 203 199 [i.1], as such comparisons would require that the assumptions and context of each study are exactly equivalent. |
104 089 | Digital Audio Broadcasting (DAB); Emergency Warning System (EWS); Definition and rules of behaviour | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104089/01.01.01_60/ts_104089v010101p.pdf | The present document defines an Emergency Warning System (EWS) for DAB which features an additional FIG for signalling the identity, status and location of an emergency with the ability for suitably equipped receivers to wake from a low-power sleep mode to provide an audio alert message targeted to the specific geographical area of concern. The rules of implementation ensure that a reliable and consistent experience will be delivered for digital radio listeners; they provide implementation details for how the Fast Information Channel (FIC) signalling is used and how receivers will interpret and behave in response to receiving the FIC signalling. The present document is complemented by ETSI TS 104 090 [i.1], which sets out the testing required to be performed on receivers to demonstrate conformance to correct operation. |
104 090 | Digital Audio Broadcasting (DAB); Emergency Warning System (EWS); Minimum requirements and test specifications for receivers | TS | 1.1.2 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104090/01.01.02_60/ts_104090v010102p.pdf | The present document describes the requirements for consumer receivers designed to be used with an Emergency Warning System (EWS) based on DAB, and the necessary test methods that lead to compliance with the requirements. It may be used as the technical basis for an EWS Certification Mark scheme. An EWS Certification Mark is designed to be used on product packaging and provides an easily recognized mark to correspond to public information campaigns on the necessary features and benefits of an EWS based on DAB. Manufacturers are, of course, free to include additional features or increased performance compared to the requirements specified in the present document. A DAB based EWS may also be used to deliver information to public signage and specialized receivers. Such devices may have additional features, such as addressability, which are not applicable to consumer receivers and are not within the scope of the present document. In addition to receivers with a minimum set of features and performance, an EWS also requires appropriate transmission infrastructure and authorization mechanisms. These latter are not within the scope of the present document. |
104 091 | Intelligent Transport Systems (ITS); Facilities Layer; Services Announcement (SA) Service; Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104091/02.01.01_60/ts_104091v020101p.pdf | The present document provides the specification of the Services Announcement (SA) service, including its protocol functions, based on ISO 16460 [1]. The definition of the interface between Service Provider and Service Announcer ITS stations (ITS-S) as well as of the communication steps following the service announcement protocol procedure and related protocol details between Service Announcer and Service User ITS-S are application-specific and are not covered by the present document. |
104 094 | Digital Video Broadcasting (DVB); Adaptive media streaming over IP multicast; Implementation guidelines and worked examples | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104094/01.01.01_60/tr_104094v010101p.pdf | The present document provides implementation guidelines for the system specified in ETSI TS 103 769 [i.1] and describes some example implementations of it. These examples are non-exhaustive, and as such do not detail every possible combination of configuration that is possible with ETSI TS 103 769 [i.1]. The baseline procedures and illustrative call flows for such a system are documented in annex A. |
104 096 | System Reference document (SRdoc); Short Range Devices; Vehicular applications operating in 300 GHz to 400 GHz and 600 GHz to 700 GHz ranges | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104096/01.01.01_60/tr_104096v010101p.pdf | The present document describes Terahertz Imaging for ground based vehicular RADARs, as defined in ECC Decision (04)03 [i.6], operating in the 300 - 400 GHz and 600 - 700 GHz bands. The present document provides information on the existing and intended applications, the technical parameters and the relation to the existing spectrum regulation in Europe. The present document includes in particular: • market information; • technical information including expected sharing and compatibility issues; • regulatory issues. |
104 097 | Access, Terminals, Transmission and Multiplexing (ATTM); Deployment of Indoor Fibre Distribution Network Hybrid Cabling System | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104097/01.01.01_60/tr_104097v010101p.pdf | The present document describes the structure of the Indoor Fibre Distribution Network (IFDN) Hybrid Cabling System, main functional elements and their characteristics, deployment details and acceptance items. |
104 098 | Technical mitigation measures to protect RAS against interference from ground based vehicular radars within 77 - 81 GHz to support revision of ECC/DEC/(04)03 | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104098/01.01.01_60/tr_104098v010101p.pdf | The present document describes technical interference mitigation measures to protect RAS against interference from ground based vehicular radars (as potential alternatives to protection zones). The present document is based on the existing studies in ECC report 350 [i.12] and is focused on the open question (see LS in ERM(24)083040) on practicality of protection zones raised by the industry during ECC discussions (FM and SRD/MG) on the public consultation comments for revision of ECC/DEC/(04)03 [i.1]. |
104 100 | Cyber Security (CYBER); Critical Security Controls for Effective Cyber Defence; Industrial Control Systems Sector | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104100/01.01.01_60/ts_104100v010101p.pdf | The present document provides guidance for implementing the Critical Security Controls to mitigate the most common form of attacks against Industrial Control Systems (ICS) commonly found in critical infrastructure. |
104 102 | Cyber Security (CYBER); Encrypted Traffic Integration (ETI); ZT-Kipling methodology | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104102/01.01.01_60/ts_104102v010101p.pdf | The present document defines a set of methods and the overall methodology for incorporating Zero Trust approaches as defined in NIST SP 800-207 [2] into an organization, product or service for the purpose of maximizing the transparency and explicability of the attack surface and to optimize the application of cybersecurity resources to minimize the attack surface. The present document specifies the ZT-Kipling methodology applied to the requirements set out in ETSI TS 104 103 [1] and which addresses the countermeasure framework described in ETSI TS 104 101 [i.8]. NOTE: Whilst the ZT-Kipling methodology and its associated methods can be automated the present document does not directly address how it can be automated and this aspect may be addressed in future standardization |
104 103 | Cyber Security (CYBER); Encrypted Traffic Integration (ETI); Problem Statement review and requirements definition | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104103/01.01.01_60/ts_104103v010101p.pdf | The present document identifies and describes the problem arising from pervasive encrypted traffic in electronic/digital communications networks. In addition, the present document states the requirements for allowing Encrypted Traffic Integration (ETI) across an abstracted network architecture. The present document identifies the impact of encrypted traffic on a number of stakeholders and how the stakeholders' objectives work together. The characterization of traffic as either user generated content, user generated signalling, network signalling, and metadata, and the relative impact on stakeholders is considered. The present document also addresses the role of compliance obligations on the development and deployment of encrypted traffic and how it impacts different stakeholders. The present document addresses the impact of pervasive encryption on stakeholders in order to assist future standards development activity in mitigating the negative impact on stakeholders whilst not adversely impacting the positive impacts of such a paradigm on stakeholders, including the regulatory and lawful dimensions. The present document is structured as follows: • Clause 4 outlines the role of encryption as it is being applied to networks from a mainly business perspective. • Clause 5 outlines and provides a model of the ETI problem. • Clause 6 presents the ETI model from a technical perspective. • Clause 7 summarizes the risk of pervasive encryption. • Clause 8 outlines the requirements for countering risks of pervasive encryption. • Annex A (normative) provides a summary of the impact of pervasive encryption on various formal compliance obligations. • Annex B (informative) gives an overview of the various common approaches to provide encryption in networks. • Annex C (informative) offers a number of examples of the impact of pervasive encryption. • Annex D (informative) addresses the application of the ETI requirements using the security controls approach. The present document includes requirements that implement the role of Zero Trust (ZT) and Zero Trust Architecture (ZTA) [1] in ETI, in order to provide an explicitly trusted communications environment across all enabled layers of the Open Systems Interconnection (OSI) model. In addition, the present document describes a ZTA security model, that enforces transparency and explicability of the role of security functions, particularly encryption. |
104 104 | Publicly Available Specification (PAS); O-RAN Security Requirements and Controls Specifications (O-RAN.WG11.SecReqSpecs-R003-v09.01) | TS | 9.1.0 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104104/09.01.00_60/ts_104104v090100p.pdf | The present document specifies the Security Requirements and appropriate Security Controls per O-RAN interface and per O-RAN component. |
104 105 | Publicly Available Specification (PAS); O-RAN Security Test Specifications (O-RAN.WG11. Security-Test-Specifications-R003-v07.00) | TS | 7.0.0 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104105/07.00.00_60/ts_104105v070000p.pdf | The present document provides description of the Security Tests, which validate security functions and configurations per security and security protocols requirements and are based on the priority of the risk analysis for O-RAN systems. |
104 106 | Publicly Available Specification (PAS); O-RAN Security Threat Modeling and Risk Assessment (O-RAN.WG11.Threat-Modeling.O-R003-v03.00) | TR | 3.0.0 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104106/03.00.00_60/tr_104106v030000p.pdf | The present document describes the O-RAN Security Threat Modeling and Risk Assessment. It identifies assets to be protected, analyses the O-RAN components for vulnerabilities, examines potential threats associated with those vulnerabilities, provides security principles which stakeholders should address when building a secure end-to-end O-RAN system and assesses the risks of the identified threats based on impact and likelihood factors. NOTE: The present document is transformed from a Technical Specification (TS) to a Technical Report (TR) as it does not contain normative requirements. Instead, it is an informative document that serves as a vital resource for understanding the potential risks within O-RAN and defining appropriate requirement/controls to mitigate them effectively. |
104 107 | Publicly Available Specification (PAS); O-RAN Security Protocols Specifications (O-RAN.WG11.Security-Protocols-Specification.O-R003-v09.00) | TS | 9.0.0 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104107/09.00.00_60/ts_104107v090000p.pdf | The present document specifies security protocols as to be used for O-RAN compliant implementation. |
104 112 | Lawful Interception (LI); Collection of test cases for Lawful Interception and Lawful Disclosure | TR | 1.2.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104112/01.02.01_60/tr_104112v010201p.pdf | The present document provides an informative basis for LI and LD related testing procedures, thus giving an international and inter-organizational understanding about applicable tests. By using the present document, communication and examination of tests is simplified by creating an equal understanding and structure of testing, regardless of time and organization. The test cases and test scenario components describe as many use cases as possible. |
104 117 | Cyber Security (CYBER); Risk Management Ecosystem | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104117/01.01.01_60/tr_104117v010101p.pdf | The present document provides an overview of the history and facets of the risk management ecosystem. The overview includes the history of this activity, the concepts and specifications that emerged, the diverse venues, use cases, and the contemporary state-of-the-art mechanisms for meeting imposed obligations. |
104 119 | Methods for Testing & Specification (MTS); AI Testing; Guidelines for Documentation of AI-enabled Systems | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104119/01.01.01_60/tr_104119v010101p.pdf | The present document provides guidelines and recommendations for documentation schemes that support the continuous and consistent documentation of quality and quality related attributes for AI-enabled systems. This includes an analysis of current documentation schemes and Use case examples. It also defines a process how to document AI-enabled systems. |
104 126 | LEA Support Services; Takedown requests; Benefits, use cases and approach | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104126/01.01.01_60/tr_104126v010101p.pdf | The present document contains the following material relating to takedown requests: • A statement of benefits for using standardized interfaces for takedown requests. • Suggestions around potential requirements (though the present document does not formally define requirements). • Use cases, examples and scenarios which are brought together into categories (the goal is that all scenarios in the same category can be handled in a similar way). • Potential approaches for each category i.e. ways to achieve the benefits for the scenarios identified (the approaches considered include creating new standards and creating Change Requests against existing standards. |
104 128 | Securing Artificial Intelligence (SAI); Guide to Cyber Security for AI Models and Systems | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104128/01.01.01_60/tr_104128v010101p.pdf | The present document gives guidance to help stakeholders in the AI supply chain in meeting the cyber security provisions defined for AI models and systems in ETSI TS 104 223 [i.1]. These stakeholders could include a diverse range of entities, including large enterprises and government departments, independent developers, Small and Medium Enterprises (SMEs), charities, local authorities and other non-profit organizations. The present document will also be useful for stakeholders planning to purchase AI services. Additionally, the present document has been designed to support the future development of AI cyber security standards, including specifications that could inform future assurance and certification programmes. Where relevant, the present document signposts supporting specifications and international frameworks. |
104 134 | Environmental Engineering (EE); Simplified Method for including Uncertainty and Sensitivity Aspects in Calculations of the Avoided Environmental Impact of Information and Communication Technology Solutions | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104134/01.01.01_60/ts_104134v010101p.pdf | The present document concerns a methodology for including uncertainty and sensitivity aspects for avoided environmental impact calculations. The objective of the present document is to provide a standardized method to assess in a simplified manner the uncertainty of calculations for avoided environmental impact resulting from the introduction of Information and Communication Technology (ICT) Solutions. Moreover, the sensitivity of individual elements and the contribution to the total uncertainty is outlined. A method is defined based on existing standards, e.g. Recommendation ITU-T L.1480 [i.8] and recognized methods which allow for communication of the results to the public and consumers. The uncertainty and sensitivity calculation procedures are standardized for the method to be developed to make visible the relation between the degree of simplification and the ability to draw conclusions. |
104 139 | Use of innovative antenna systems within millimetre Wave Transmission and impacts on standards and regulations | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104139/01.01.01_60/tr_104139v010101p.pdf | The present document deals with innovative technologies applicable to mmW transmission for what regards the antenna system. |
104 140 | Propagation measurement and modelling for PtP radio links in the E, W and D bands | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104140/01.01.01_60/tr_104140v010101p.pdf | The present document provides information about electromagnetic propagation at millimetre wave, considering the available models, both derived from physical analysis and from real data fitting and comparing them with measurements. |
104 141 | Practical Methods for Wireless Backhaul Planning with New KPIs | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104141/01.01.01_60/tr_104141v010101p.pdf | The present document has the goal of defining practical and effective methods for planning wireless backhaul links according to the novel approach detailed in ETSI GR mWT 028 [i.1]. One key area of investigation and contribution is the design of appropriate prediction models of the aggregated traffic demand statistics of any backhaul link as a function of few high-level and easy-to-know RAN-related behavioural features, such as the average and the peak values of the transported throughput, or the configuration of the various radio access technologies implemented in the connected sites. The derived prediction models are conceived with the goal of being easily embedded within the software framework of the currently available backhaul planning tools, thus pursuing the strategic benefit of making the choice of the link traffic demand distribution required for enabling the New KPIs methodology (namely, for computing the BTA metric) a completely transparent process for the end user. In this context, the present document discloses an analytical procedure targeted at deriving a pessimistic estimation of the BTA of any backhaul link on the basis of the sole knowledge of the average and the peak values of its traffic demand, that could be used for a conservative and practical network planning. Secondly, the present document describes a methodology for conducting measurement campaigns on live transport networks and for processing the collected data in order to create a discrete set of reference throughput demand distributions to be used in the assessment of the BTA of any backhaul link, after a proper identification and classification of its main deployment features (e.g. number and type of transported radio access layers) and statistical properties. |
104 142 | Long term view on Fixed Services in frequency bands below 10 GHz; Assessment of low frequency bands importance in delivering ubiquitous network coverage | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104142/01.01.01_60/tr_104142v010101p.pdf | The present document assesses the importance of low frequency bands in wireless backhaul networks collecting information on current use by Fixed Services of the bands lower than 10 GHz, expected use on medium term and reporting technical considerations on why bands below 10 GHz are necessary to deploy long haul links, supported by link planning examples and bands performances comparison in different areas. |
104 143 | SDN SBI Wireless Transport Profiles for Network Automation | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104143/01.01.01_60/ts_104143v010101p.pdf | The present document specifies the principles, objectives, and technical framework, which addresses the definition of standardized hardware inventory models for microwave wireless backhaul at the SDN Southbound Interface. It focuses on the modelling of hardware inventory information for microwave Network Elements as exchanged between a microwave SDN Controller and microwave Network Elements by means of standard, common YANG data model profiles exposed over NETCONF. Service-layer abstractions, performance management, and control-plane behaviour are present in the present document, when required to support accurate and interoperable hardware inventory representation. |
104 144 | Interface definition for the e-Evidence Regulation (EU) 2023/1543 for National Authorities and Service Providers | TS | 1.3.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104144/01.03.01_60/ts_104144v010301p.pdf | The present document provides an interface definition for the e-Evidence Regulation (EU) 2023/1543 [i.1], supporting National Authorities and Service Providers in understanding and complying with its requirements. The present document provides an overview of the overall solution, defines the workflow profile for ETSI TS 103 120 [1] that facilitates compliance with Regulation (EU) 2023/1543 [i.1] and provides best practices and technical recommendations. The present document serves as a technical interface definition to foster consistent and effective application across the EU. |
104 147-1 | Mission Critical (MC) services; Mission Critical Push To Talk (MCPTT) Application Server (AS) Protocol conformance specification for server-to-client interface; Part 1: Test structure, configurations, conformance requirement and test purposes | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/10414701/01.01.01_60/ts_10414701v010101p.pdf | The present document specifies the protocol conformance testing for testing a MCPTT Server for compliance to the Mission Critical Push To Talk (MCPTT) over LTE protocol requirements defined by 3GPP. The present document addresses only MCPTT Server-Client communication scenarios. It does not cover e.g. MCPTT Server-EPS, MCPTT Server-SIP Core, etc. scenarios which involve interfaces which implementation may widely vary. In particular the present specification contains: • the overall test structure; • the test configurations; • the conformance requirement and reference to the core specifications; • the test purposes; and • a brief description of the test procedure, the specific test requirements and short message exchange table. The present document is valid for MCPTT Servers implemented according to 3GPP releases starting from Release 14 up to the Release indicated on the cover page of the present document. The following information relevant to testing specified in the present document could be found in accompanying specifications: • default setting of the test parameters ETSI TS 136 579-1 [1] (3GPP TS 36.579-1); • Implementation Conformance Statement (ICS) ETSI TS 136 579-4 [2] (3GPP TS 36.579-4) and Implementation extra Information for Testing (IXIT) ETSI TS 136 579-5 [i.7] (3GPP TS 36.579-5); • the applicability of each test case ETSI TS 136 579-4 [2] (3GPP TS 36.579-4). The present document does not specify the protocol conformance testing for the EPS (LTE) bearers which carry the MCPTT data sent or received by the MCPTT Server. The specification of such testing is out of the scope of RAN5. |
103 983 | Publicly Available Specification (PAS); A1 interface: General Aspects and Principles (O-RAN.WG2.A1GAP-R004-v04.0.0) | TS | 4.0.0 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103983/04.00.00_60/ts_103983v040000p.pdf | The present document specifies the general aspects and principles of the A1 interface. |
103 666-1 | Smart Secure Platform (SSP); Part 1: General characteristics (Release 17) | TS | 17.3.0 | http://www.etsi.org/deliver/etsi_ts/103600_103699/10366601/17.03.00_60/ts_10366601v170300p.pdf | The present document is part of a series of documents that specify the technical solution for the Smart Secure Platform (SSP), according to the requirements listed in ETSI TS 103 465 [i.2]. The present document contains generic technical solutions for different aspects of SSP functionality. It does not specify any specific type of SSP. The types of SSP are referred to as classes. The class specifications (for example the integrated SSP technical specification in ETSI TS 103 666-2 [8], the embedded SSP Type 1 technical specification in ETSI TS 103 666-3 [44] or the embedded SSP Type 2 technical specification in ETSI TS 103 666-4 [45]) refer to the present document for common SSP functionality. |
104 149-1 | Mission Critical (MC) services; Mission Critical Data (MCData) Application Server (AS) Protocol conformance specification for server-to-client interface; Part 1: Test structure, configurations, conformance requirement and test purposes | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/10414901/01.01.01_60/ts_10414901v010101p.pdf | The present document specifies the protocol conformance testing for testing a MCData Server for compliance to the Mission Critical Data (MCData) over LTE protocol requirements defined by 3GPP. The present document addresses only MCData Server-Client communication scenarios. It does not cover e.g. MCData Server-EPS, MCData Server-SIP Core, etc. scenarios which involve interfaces which implementation may widely vary. In particular the present specification contains: • the overall test structure; • the test configurations; • the conformance requirement and reference to the core specifications; • the test purposes; and • a brief description of the test procedure, the specific test requirements and short message exchange table. The present document is valid for MCData Servers implemented according to 3GPP releases starting from Release 14 up to the Release indicated on the cover page of the present document. The following information relevant to testing specified in the present document could be found in accompanying specifications: • default setting of the test parameters ETSI TS 136 579-1 [1] (3GPP TS 36.579-1); • Implementation Conformance Statement (ICS) ETSI TS 136 579-4 [3] (3GPP TS 36.579-4) and Implementation extra Information for Testing (IXIT) ETSI TS 136 579-5 [i.2] (3GPP TS 36.579-5); • the applicability of each test case ETSI TS 136 579-4 [3] (3GPP TS 36.579-4). The present document does not specify the protocol conformance testing for the EPS (LTE) bearers which carry the MCData data sent or received by the MCData Server. The specification of such testing is out of the scope of RAN5. |
104 149-2 | Mission Critical (MC) services; Mission Critical Data (MCData) Application Server (AS) Protocol conformance specification for server-to-client interface; Part 2: Test Applicability and Implementation Conformance Statement (ICS) pro forma specification | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/10414902/01.01.01_60/ts_10414902v010101p.pdf | The present document provides the Implementation Conformance Statement (ICS) pro forma for testing Server implementations for compliance to the Mission Critical Services over LTE protocol requirements defined by 3GPP, and in accordance with the relevant guidance given in ISO/IEC 9646-1 [i.3] and ISO/IEC 9646-7 [2]. The present document specifies the recommended applicability statement for the test cases included in ETSI TS 104 149-1 [4]. These applicability statements are based on the features implemented in the Server respectively. The present document is valid for Mission Critical Push to Talk (MCData) Servers implemented according to 3GPP releases starting from Release 14 up to the Release indicated on the cover page of the present document. The present document does not specify applicability or ICS for protocol conformance testing for the EPS (LTE) bearers which carry the Mission Critical Services data sent or received by the Client and/or the Server. These are defined in ETSI TS 136 523-2 [i.11] (3GPP TS 36.523-2). |
104 151-1 | Mission Critical (MC) services; Mission Critical Video (MCVideo) Application Server (AS) Protocol conformance specification for server-to-client interface; Part 1: Test structure, configurations, conformance requirement and test purposes | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/10415101/01.01.01_60/ts_10415101v010101p.pdf | The present document specifies the protocol conformance testing for testing a MCVideo Server for compliance to the Mission Critical Video (MCVideo) over LTE protocol requirements defined by 3GPP. The present document addresses only MCVideo Server-Client communication scenarios. It does not cover e.g. MCVideo Server-EPS, MCVideo Server- SIP Core, etc. scenarios which involve interfaces which implementation may widely vary. In particular the present specification contains: • the overall test structure; • the test configurations; • the conformance requirement and reference to the core specifications; • the test purposes; and • a brief description of the test procedure, the specific test requirements and short message exchange table. The present document is valid for MCVideo Servers implemented according to 3GPP releases starting from Release 14 up to the Release indicated on the cover page of the present document. The following information relevant to testing specified in the present document could be found in accompanying specifications: • default setting of the test parameters ETSI TS 136 579-1 [1] (3GPP TS 36.579-1); • Implementation Conformance Statement (ICS) ETSI TS 136 579-4 [2] (3GPP TS 36.579-4) and Implementation extra Information for Testing (IXIT) ETSI TS 136 579-5 [i.3] (3GPP TS 36.579-5); • the applicability of each test case ETSI TS 136 579-4 [2] (3GPP TS 36.579-4). The present document does not specify the protocol conformance testing for the EPS (LTE) bearers which carry the MCVideo data sent or received by the MCVideo Server. The specification of such testing is out of the scope of RAN5. |
104 151-2 | Mission Critical (MC) services; Mission Critical Video (MCVideo) Application Server (AS) Protocol conformance specification for server-to-client interface; Part 2: Test Applicability and Implementation Conformance Statement (ICS) pro forma specification | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/10415102/01.01.01_60/ts_10415102v010101p.pdf | The present document provides the Implementation Conformance Statement (ICS) pro forma for testing Server implementations for compliance to the Mission Critical Services over LTE protocol requirements defined by 3GPP, and in accordance with the relevant guidance given in ISO/IEC 9646-1 [i.6] and ISO/IEC 9646-7 [2]. The present document specifies the recommended applicability statement for the test cases included in ETSI TS 104 151-1 [4]. These applicability statements are based on the features implemented in the Server respectively. The present document is valid for Mission Critical Video (MCVideo) Servers implemented according to 3GPP releases starting from Release 14 up to the Release indicated on the cover page of the present document. The present document does not specify applicability or ICS for protocol conformance testing for the EPS (LTE) bearers which carry the Mission Critical Services data sent or received by the Client and/or the Server. These are defined in ETSI TS 136 523-2 [i.5] (3GPP TS 36.523-2). |
104 152-1 | Mission Critical (MC) services; Mission Critical Video (MCVideo) Application Server (AS) Protocol conformance specification for server-to-server interface; Part 1: Test structure, configurations, conformance requirement and test purposes | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/10415201/01.01.01_60/ts_10415201v010101p.pdf | The present document specifies the protocol conformance testing for testing a MCVideo Server for compliance to the Mission Critical Video (MCVideo) over LTE protocol requirements defined by 3GPP. The present document addresses only MCVideo Server-Server communication scenarios. It does not cover e.g. MCVideo Server-EPS, MCVideo Server- SIP Core, etc. scenarios which involve interfaces which implementation may widely vary. In particular the present specification contains: • the overall test structure; • the test configurations; • the conformance requirement and reference to the core specifications; • the test purposes; and • a brief description of the test procedure, the specific test requirements and short message exchange table. The present document is valid for MCVideo Servers implemented according to 3GPP releases starting from Release 14 up to the Release indicated on the cover page of the present document. The following information relevant to testing specified in the present document could be found in accompanying specifications: • default setting of the test parameters ETSI TS 136 579-1 [1] (3GPP TS 36.579-1); • Implementation Conformance Statement (ICS) ETSI TS 136 579-4 [2] (3GPP TS 36.579-4) and Implementation extra Information for Testing (IXIT) ETSI TS 136 579-5 [i.4] (3GPP TS 36.579-5); • the applicability of each test case ETSI TS 136 579-4 [2] (3GPP TS 36.579-4). The present document does not specify the protocol conformance testing for the EPS (LTE) bearers which carry the MCVideo data sent or received by the MCVideo Server. The specification of such testing is out of the scope of RAN5. |
104 152-2 | Mission Critical (MC) services; Mission Critical Video (MCVideo) Application Server (AS) Protocol conformance specification for server-to-server interface; Part 2: Test Applicability and Implementation Conformance Statement (ICS) pro forma specification | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/10415202/01.01.01_60/ts_10415202v010101p.pdf | The present document provides the Implementation Conformance Statement (ICS) pro forma for testing Server implementations for compliance to the Mission Critical Services over LTE protocol requirements defined by 3GPP, and in accordance with the relevant guidance given in ISO/IEC 9646-1 [i.6] and ISO/IEC 9646-7 [2]. The present document specifies the recommended applicability statement for the test cases included in ETSI TS 104 152-1 [4]. These applicability statements are based on the features implemented in the Server respectively. The present document is valid for Mission Critical Video (MCVideo) Servers implemented according to 3GPP releases starting from Release 14 up to the Release indicated on the cover page of the present document. The present document does not specify applicability or ICS for protocol conformance testing for the EPS (LTE) bearers which carry the Mission Critical Services data sent or received by the Client and/or the Server. These are defined in ETSI TS 136 523-2 [i.5] (3GPP TS 36.523-2). |
104 153-1 | Core Network and Interoperability Testing (INT); Conformance Testing for IP/ICMP Translation Algorithm; (IETF RFC 7915); Part 1: Protocol Implementation Conformance Statement (PICS) | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/10415301/01.01.01_60/ts_10415301v010101p.pdf | The present document provides the Protocol Implementation Conformance Statement (PICS) pro forma for the test specification for the IP/ICMP Translation Algorithm as specified in IETF RFC 7915 [1] in compliance with the relevant requirements and in accordance with the relevant guidance given in ISO/IEC 9646-7 [2] and ETSI ETS 300 406 [i.2]. The supplier of a protocol implementation which is claimed to conform to IETF RFC 7915 [1] is required to complete a copy of the PICS pro forma provided in annex A of the present document and is required to provide the information necessary to identify both the supplier and the implementation. |
104 153-2 | Core Network and Interoperability Testing (INT); Conformance Testing for IP/ICMP Translation Algorithm; (IETF RFC 7915); Part 2: Test Suite Structure (TSS) and Test Purposes (TP) | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/10415302/01.01.01_60/ts_10415302v010101p.pdf | The present document provides the Test Suite Structure (TSS) and Test Purposes (TP) for the test specification for the IP/ICMP Translation Algorithm as specified in IETF RFC 7915 [1] in compliance with the relevant requirements and in accordance with the relevant guidance given in ISO/IEC 9646-7 [i.2] and ETSI ETS 300 406 [i.3]. |
104 153-3 | Core Network and Interoperability Testing (INT); Conformance Testing for IP/ICMP Translation Algorithm; (IETF RFC 7915); Part 3: Abstract Test Suite (ATS) and partial Protocol Implementation eXtra Information for Testing (PIXIT) pro forma specification | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/10415303/01.01.01_60/ts_10415303v010101p.pdf | The present document specifies the Abstract Test Suite (ATS) and partial Protocol Implementation eXtra Information for Testing (PIXIT) pro forma for the test specification for the IP/ICMP Translation Algorithm as specified in IETF RFC 7915 [1] in compliance with the relevant requirements and in accordance with the relevant guidance given in ISO/IEC 9646-7 [i.2] and ETSI ETS 300 406 [5]. The test notation used in the ATS is TTCN-3 (see ETSI ES 201 873-1 [i.3]). The following test specification and design considerations can be found in the body of the present document: • the overall test suite structure; • the testing architecture; • the test methods and port definitions; • the test configurations; • TTCN styles and conventions; • the partial PIXIT pro forma; • the modules containing the TTCN-3 ATS. Annex A provides the Partial Implementation Extra Information for Testing (PIXIT) pro forma. |
104 159 | Securing Artificial Intelligence (SAI); Understanding and Preventing Harm from Generative AI | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104159/01.01.01_60/tr_104159v010101p.pdf | The present document provides an understanding of the harm from Generative AI, along with presenting the different ways to prevent that harm. This includes but is not limited to malicious code generation, deepfakes, spam messages, disinformation, etc. The areas also covered are the issues of AI hallucinations, loss of confidentiality and IPR infringements. The types of methods to counter the harm from Generative AI to be included are detection, enforcement, reporting and removal. |
104 160 | Cyber Security (CYBER); Observation from the ERATOSTHENES and CERTIFY projects regarding IoT security lifecycle | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104160/01.01.01_60/tr_104160v010101p.pdf | The present document will focus on presenting the results, observations and lessons learnt from the ERATOSTHENES and CERTIFY projects that tackle the complex security challenges of the Internet of Things (IoT) with a focus on managing the entire lifecycle of these networks, with a specific focus on distributed trust management and digital identity solutions, and the certification process. |
104 161 | Core Network and Interoperability Testing (INT); Testbed as a Service application program interfaces descriptions and interoperability requirements [Recommendation ITU-T Q.4077 (04/2025)] | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104161/01.01.01_60/ts_104161v010101p.pdf | The present document is a transposition of Recommendation ITU-T Q.4077 [1] without modifications. |
104 162 | Core Network and Interoperability Testing (INT); User requirements and reference model for Testbed as a Service [Recommendation ITU-T Q.4078 (04/2025)] | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104162/01.01.01_60/ts_104162v010101p.pdf | The present document is a transposition of Recommendation ITU-T Q.4078 [1] without modifications. |
104 163 | Core Network and Interoperability Testing (INT); Federated testbeds taxonomy [ITU-T Technical Report QSTR.FTT (02/2025)] | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104163/01.01.01_60/tr_104163v010101p.pdf | The present document is a transposition of ITU-T Technical Report QSTR.FTT [i.1] without modifications. |
104 164 | Core Network and Interoperability Testing (INT); Testbeds Federation roadmap [ITU-T Technical Report QSTR-TFR (02/2025)] | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104164/01.01.01_60/tr_104164v010101p.pdf | The present document is a transposition of ITU-T Technical Report QSTR-TFR [i.1] without modifications. |
104 165 | Core Network and Interoperability Testing (INT); Use cases for federated testbeds and business scenarios [ITU-T Technical Report QSTR-UCFTBS (02/2025)] | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104165/01.01.01_60/tr_104165v010101p.pdf | The present document is a transposition of ITU-T Technical Report QSTR-UCFTBS [i.1] without modifications. |
104 166 | Core Network and Interoperability Testing (INT); Guide on development and maintenance of ONPs (Open Networking Platforms) and federations for IMT-2020 and beyond [ITU-T Technical Report QSTR-GDM (02/2025)] | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104166/01.01.01_60/tr_104166v010101p.pdf | The present document is a transposition of ITU-T Technical Report (02/2025) QSTR-GDM [i.1] without modifications. |
104 168 | Cyber Security (CYBER); Critical Security Controls for Network and Information Security Directive 2 (NIS2) | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104168/01.01.01_60/tr_104168v010101p.pdf | The present document item provides a mapping between the Critical Security Controls and NIS2 provisions. |
104 169 | Cyber Security (CYBER); Critical Security Controls for the Digital Operational Resilience Act (DORA) | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104169/01.01.01_60/tr_104169v010101p.pdf | The present document provides a mapping between the Critical Security Controls and DORA provisions. |
104 170 | Cyber Security (CYBER); Universal Cybersecurity Information Exchange Framework - Repository | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104100_104199/104170/01.01.01_60/ts_104170v010101p.pdf | The present document provides a universal, inclusive structured framework-repository directory that identifies cybersecurity activity clusters and associated commonly used specifications that entail information exchange and associated information repositories. Responsible parties, network location and availability are included. Uses involving cybersecurity legislative instruments such as those in the EU, as well as industry norms, are identified and information repositories - especially those used for AI LLM ingestion - are included. The ETSI Forge and OID leaf are used for the UCYBEX repository-directory. |
104 196 | Considerations for using portals to support requests from Authorized Organizations | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104100_104199/104196/01.01.01_60/tr_104196v010101p.pdf | The present document describes considerations for situations in which providers choose to adopt web-based portal solutions to respond to requests from Authorized Organizations. The present document describes portals and explains how existing ETSI TC LI specifications can be used to improve portal design. The present document shows how portals can become a stepping stone towards adoption of interfaces defined by an ETSI TC LI Technical Specification. The present document highlights some caveats around portals and makes it clear that portals are not a substitute for meeting ETSI TC LI Technical Specifications. |
104 200 | Data Solutions (DATA); Proof of Concept Framework | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104200_104299/104200/01.01.01_60/ts_104200v010101p.pdf | The present document specifies a framework for use within ETSI TC DATA to coordinate and promote public demonstrations of Proof of Concept (PoC) validating key technical components developed in TC DATA. The objective for the PoCs is to build commercial awareness and confidence and encourage development of an open ecosystem by integrating components from different players. |
104 221 | Securing Artificial Intelligence (SAI); Problem Statement | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104200_104299/104221/01.01.01_60/tr_104221v010101p.pdf | The present document describes the problem of securing AI-based systems and solutions, with a focus on machine learning, and the challenges relating to confidentiality, integrity and availability at each stage of the machine learning lifecycle. It also describes some of the broader challenges of AI systems including bias, ethics and explainability. A number of different attack vectors are described, as well as several real-world use cases and attacks. NOTE: The present document updates and replaces ETSI GR SAI 004 [i.32]. |
104 222 | Securing Artificial Intelligence; Mitigation Strategy Report | TR | 1.2.1 | http://www.etsi.org/deliver/etsi_tr/104200_104299/104222/01.02.01_60/tr_104222v010201p.pdf | The present document summarizes and analyses existing and potential mitigation against threats for AI-based systems as discussed in ETSI GR SAI 004 [i.1]. The goal is to have a technical survey for mitigating against threats introduced by adopting AI into systems. The technical survey shed light on available methods of securing AI-based systems by mitigating against known or potential security threats. It also addresses security capabilities, challenges, and limitations when adopting mitigation for AI-based systems in certain potential use cases. |
104 223 | Securing Artificial Intelligence (SAI); Baseline Cyber Security Requirements for AI Models and Systems | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104200_104299/104223/01.01.01_60/ts_104223v010101p.pdf | The present document defines baseline security requirements for AI models and systems. This includes systems that incorporate deep neural networks, such as generative AI. For consistency, the term "AI systems" throughout the present document when framing the scope of provisions and "AI security" which is considered a subset of cyber security. The present document is not designed for academics who are creating and testing AI systems only for research purposes (AI systems which are not going to be deployed). The present document separates principles and requirements into five phases. These are secure design, secure development, secure deployment, secure maintenance and secure end of life. Relevant standards and publications are signposted at the start of each principle to highlight links between the various documents and the present document. This is not an exhaustive list. NOTE: The principles can also be mapped to the life cycle stages described in ISO/IEC 22989 [i.3]. The secure design and development principles can be applied during the Design and development life cycle stage. Similarly, the secure deployment principles can be applied during the Deployment stage, secure maintenance to the Operations and monitoring stage and secure end of life during the Retirement stage. |
104 224 | Securing Artificial Intelligence (SAI); Explicability and transparency of AI processing | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104200_104299/104224/01.01.01_60/ts_104224v010101p.pdf | The present document identifies steps to be taken by designers and implementers of AI platforms in order to give assurance of the explicability and transparency of AI processing. AI processing includes AI decision making and AI data processing. NOTE: The present document uses the term explicability but recognizes that many other publications use the term explainability as a synonym. The terms are interchangeable with the proviso that the latter term is not a commonly accepted UK English word but that it has been used in the specific context of AI (see also clause 3.1 of the present document). |
104 225 | Securing Artificial Intelligence TC (SAI); Privacy aspects of AI/ML systems | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104200_104299/104225/01.01.01_60/tr_104225v010101p.pdf | The present document identifies the role of privacy as one of the components of the Security of AI, and defines measures to protect and preserve privacy in the context of AI that covers both, safeguarding models and protecting data, as well as the role of privacy-sensitive data in AI solutions. It documents and addresses the attacks and their associated remediations where applicable, considering the existence of multiple levels of trust affecting the lifecycle of data. The investigated attack mitigations include Non-AI-Specific (traditional Security/Privacy redresses), AI/ML-specific remedies, proactive remediations ("left of the boom"), and reactive responses to an adversarial activity ("right of the boom"). |
104 226 | Publicly Available Specification (PAS); Non-RT RIC & A1/R1 interface: Use Cases and Requirements (O-RAN.WG2.Use-Case-Requirements-R004-v10.01) | TS | 10.1.0 | http://www.etsi.org/deliver/etsi_ts/104200_104299/104226/10.01.00_60/ts_104226v100100p.pdf | The present document specifies the RAN optimization and control related use cases that have been approved within O-RAN WG2. The purpose of the use cases is to help identify requirements for O-RAN defined interfaces and functions, specifically Non-RT RIC function and A1 and R1 interfaces, eventually leading to formal drafting of interface specifications. For each use case, the present document describes the motivation, resources, steps involved, and data requirements. Finally, the requirements clause details the functional and non-functional requirements derived from these use cases. |
104 227 | Hybrid Broadcast Broadband Television; Integration of Digital Rights Management (DRM) | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104200_104299/104227/01.01.01_60/ts_104227v010101p.pdf | The present document defines the integration between HbbTV® (as defined in ETSI TS 102 796 [1]) and broadband content protection technologies - "DRM". This integration has not previously been included in ETSI TS 102 796 [1] and is in the present document to contribute to inter-operability. The DRM systems supporting HbbTV® and cited in the present document are the most widespread at the moment. Further DRM systems may be considered for addition in a future revision of the present document subject to meeting the requirements listed in clause 10 of the present document. The present document does not mandate a DRM system or version, this is a commercial choice for stakeholders. |
104 228 | Publicly Available Specification (PAS); O-RAN R1 interface General Aspects and Principles (O-RAN.WG2.TS.R1GAP-R004-v11.00) | TS | 11.0.0 | http://www.etsi.org/deliver/etsi_ts/104200_104299/104228/11.00.00_60/ts_104228v110000p.pdf | The present document specifies the general aspects and principles of the R1 interface. It is part of a TS-family covering the R1 interface specifications. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.