< 上一个 | 内容 | 下一个 >

2. Normative references

The following referenced documents are indispensable for the application of this document (i.e., they must be understood and used, so each referenced document is cited in text and its relationship to this document is explained). For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments or corrigenda) applies.


IEC 61968, Application integration at electric utilities—System interfaces for distribution management— All parts.1


IEEE Std 2030.5™, Supplemental material (http://standards.ieee.org/downloads/2030.5/).2


IEEE Std 802.1AR™, IEEE Standard for Local and Metropolitan Area Networks—Secure Device Identity (http://www.ieee802.org/1/pages/802.1ar.html).


image

1 IEC publications are available from the International Electrotechnical Commission (http://www.iec.ch) and the American National Standards Institute (http://www.ansi.org/).

2 The IEEE standards or products referred to in Clause 2 are trademarks owned by The Institute of Electrical and Electronics Engineers, Incorporated.


IETF, Extended Multicast DNS (https://tools.ietf.org/html/draft-lynn-homenet-site-mdns-01). IETF RFC 793, Transmission Control Protocol (http://tools.ietf.org/html/rfc793).

IETF RFC 1630, Universal Resource Identifiers in WWW (http://tools.ietf.org/html/rfc1630).


IETF RFC 2119, Key Words for Use in RFCs to Indicate Requirement Levels (http://tools.ietf.org/html/rfc2119). IETF RFC 2818, HTTP Over TLS (http://tools.ietf.org/html/rfc2818).

IETF RFC 2863, The Interface MIB (https://tools.ietf.org/html/rfc2863).


IETF RFC 3986, Uniform Resource Identifier (URI): Generic Syntax (https://tools.ietf.org/html/rfc3986).


IETF RFC 4108, Using Cryptographic Message Syntax (CMS) to Protect Firmware (http://tools.ietf.org/ html/rfc4108).


IETF RFC 4193, Unique IPv6 Unicast Addresses (http://tools.ietf.org/html/rfc4193). IETF RFC 4291, IP Version 6 Addressing Architecture (http://tools.ietf.org/html/rfc4291).

IETF RFC 5246, Transport Layer Security (TLS) Protocol Version 1.2 (http://tools.ietf.org/html/rfc5246).


IETF RFC 5280, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (http://tools.ietf.org/html/rfc5280).


IETF RFC 5480, Elliptic Curve Cryptography Subject Public Key Information (http://tools.ietf.org/ html/rfc5480).


IETF RFC 6550, RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. (http://tools.ietf.org/ html/rfc6550).


IETF RFC 6554, An IPv6 Routing Header for Source Routes with the Routing Protocol for Low-Power and Lossy Networks (RPL) (http://tools.ietf.org/html/rfc6554).


IETF RFC 6763, DNS-Based Service Discovery (http://tools.ietf.org/html/rfc6763).


IETF RFC 6960, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol—OCSP (https://tools.ietf.org/html/rfc6960).


IETF RFC 7230, Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing (https:// tools.ietf.org/html/rfc7230).


IETF RFC 7231, Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content (https://tools.ietf.org/ html/rfc7231).


IETF RFC 7232, Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests (https://tools.ietf.org/ html/rfc7232).


IETF RFC 7233, Hypertext Transfer Protocol (HTTP/1.1): Range Requests (https://tools.ietf.org/ html/rfc7233).


IETF RFC 7234, Hypertext Transfer Protocol (HTTP/1.1): Caching (https://tools.ietf.org/html/rfc7234). IETF RFC 7235, Hypertext Transfer Protocol (HTTP/1.1): Authentication (https://tools.ietf.org/html/rfc7235).


IETF RFC 7251, AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS (http:// tools.ietf.org/html/rfc7251).


Internet Assigned Numbers Authority (IANA), Private Enterprise Number (PEN) Request.3


ISO 4217, Codes for the representation of currencies.4


ITU-T Recommendation X.680 (08/2015), Information technology—Abstract Syntax Notation One (ASN.1): Specification of basic notation.5


NIST Special Publication (SP) 800-57, Recommendation for Key Management.6


NIST Special Publication (SP) 800-131A, Transition: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths.


W3C, Efficient XML Interchange (EXI) Format 1.0 (http://www.w3.org/TR/exi/).7


W3C, Extensible Markup Language (XML) (http://www.w3.org/TR/REC-xml/).


W3C, Web Application Description Language (WADL) (http://www.w3.org/Submission/wadl/).