ISO/IEC 24775:2011
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology Storage management
PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
04-17-2019
ISO/IEC 24775-7:2014
ISO/IEC 24775-4:2014
ISO/IEC 24775-1:2014
ISO/IEC 24775-2:2014
ISO/IEC 24775-3:2014
ISO/IEC 24775-6:2014
ISO/IEC 24775-5:2014
ISO/IEC 24775-8:2014
English
03-01-2011
ISO/IEC 24775:2011(E) defines an interface for the secure, extensible,and interoperable management of a distributed and heterogeneous storage system.This interface uses an object-oriented, XML-based, messagingbasedprotocol designed to support the specific requirements of managing devices andsubsystems in this storage environment. Using this protocol, this InternationalStandard describes the information available to a WBEM Client from an SMI-Scompliant CIM WBEM Server. This second edition cancels and replaces the firstedition published in 2007 and constitutes a technical. This edition includesthe following significant changes with respect to the previous edition:
- Expanded scope: The range of SAN components modeled by the profiles definedin this specification has been greatly expanded. Many of the profiles that wereidentified as either future work or experimental content at the time of theinitial publication havematured to full profiles. In addition, new areas have been modeledand included (e.g., SCSI Target Ports).
- Improved organization: The specification has been reorganized to provide moreinformation more easily. The experimental content has been incorporated intothe body of the document, rather than being segregated in an annex, to easeplanning for adoption of emerging techniques.
- Additional documentation of best practices and deployment concerns: Thespecification now includes a more formal representation of common deploymentand usage practices, a more completetreatment of backward compatibility issues and a more detailed discussion ofthe capabilities of the API, grouping them into a five-level architecture,spanning from physical devices to application-level manipulation, andaddressing error conditions, configuration, accounting performance and securityissues at each level.
DevelopmentNote |
Also available in CD-ROM format. (03/2011)
|
DocumentType |
Standard
|
Pages |
1484
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
Standards | Relationship |
NEN ISO/IEC 24775 : 2011 | Identical |
CSA ISO/IEC 24775 : 2012 : R2016 | Identical |
BS EN ISO 9680:2007 | Identical |
CSA ISO/IEC 24775 : 2012 | Identical |
CSA ISO/IEC 24775 : 2012 | INFORMATION TECHNOLOGY - STORAGE MANAGEMENT |
CSA ISO/IEC 24775 : 2012 : R2016 | INFORMATION TECHNOLOGY - STORAGE MANAGEMENT |
I.S. EN ISO/IEC 27040:2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
EN 62453-1:2017 | Field Device Tool (FDT) interface specification - Part 1: Overview and guidance |
I.S. EN 62453-1:2017 | FIELD DEVICE TOOL (FDT) INTERFACE SPECIFICATION - PART 1: OVERVIEW AND GUIDANCE |
DIN EN ISO/IEC 27040:2016-04 (Draft) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY (ISO/IEC 27040:2015) |
BS EN 62453-1:2017 | Field Device Tool (FDT) interface specification Overview and guidance |
IEC 62453-1:2016 | Field device tool (FDT) interface specification - Part 1: Overview and guidance |
BS ISO/IEC 27040 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
BS EN ISO/IEC 27040:2016 | Information technology. Security techniques. Storage security |
ISO/IEC 27040:2015 | Information technology — Security techniques — Storage security |
EN ISO/IEC 27040:2016 | Information technology - Security techniques - Storage security (ISO/IEC 27040:2015) |
ANSI INCITS 464 : 2010 : R2015 | INFORMATION TECHNOLOGY - INFORMATION MANAGEMENT - EXTENSIBLE ACCESS METHOD (XAM[TM]) - PART 1: ARCHITECTURE; PART 2: C API; PART 3: JAVA API |
INCITS/ISO/IEC 27040 : 2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - STORAGE SECURITY |
ANSI INCITS 464 : 2010 | INFORMATION TECHNOLOGY - INFORMATION MANAGEMENT - EXTENSIBLE ACCESS METHOD (XAM[TM]) - PART 1: ARCHITECTURE; PART 2: C API; PART 3: JAVA API |
ANSI INCITS 408 : 2005 | INFORMATION TECHNOLOGY - SCSI PRIMARY COMMANDS - 3 (SPC-3) |
ANSI INCITS 402 : 2005 | INFORMATION TECHNOLOGY - SCSI ARCHITECTURE MODEL - 3 (SAM-3) |
ANSI INCITS 373 : 2003 | INFORMATION TECHNOLOGY - FIBRE CHANNEL - FRAMING AND SIGNALING (FC-FS) |
ANSI INCITS 387 : 2004 | INFORMATION TECHNOLOGY - FIBRE CHANNEL - GENERIC SERVICES - 4 (FC-GS-4) |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.