Proposed new part 7 of URC standard: RESTful Target Integration

Below is the outline draft of the proposed new part 7 for ISO/IEC 24752.
The pertaining new work item proposal is currently under vote within ISO/IEC
JTC1.  If you are part of the corresponding mirror group within your
national standardization organization, you should be able to contribute to
the vote.

 

Thanks,

Gottfried

___________________________________________________

 

 Prof. Dr. Gottfried Zimmermann

Mobile User Interaction

___________________________________________________

 

Information technology - User interfaces - Universal remote console - 

Part 7: RESTful Target Integration

 

Foreword           5

Introduction      6

1 Scope 8

2 Conformance 8

3 Normative references 8

4 Terms and definitions 8

4.1         8

4.2         8

5 Conceptual model       9

5.1 General        9

5.2 Considerations on RESTful design      9

5.3 Concurrency              9

5.4 Target Instance Identifier      9

5.5 Session Identifier     9

5.6 Paths            9

5.7 Values          9

5.8 Context        9

6 Target management   10

6.1 General        10

6.2 Get target information          10

6.3 Get sockets information       10

7 Locator management 10

7.1 General        10

7.2 Get locators information      10

7.3 Invoke locator           10

8 Session management 10

8.1 General        10

8.2 Open session            10

8.3 Close session             10

8.4 Session forward request       10

8.5 Suspend session       10

8.6 Resume session        10

8.7 Abort session            10

9 Socket elements          10

9.1 General        10

9.2 Is element available 10

9.3 Get element value   10

9.4 Get indices  10

9.5 Add index    10

9.6 Remove index           10

9.7 Set element value    10

9.8 Get update  10

10 Control flow 10

10.1 General      10

10.2 Target discovery     10

10.3 Session management          11

10.4 Session forwarding 11

10.5 Target aborts session          11

10.6 Adding and removing indices           11

10.7 Getting and setting variable values 11

10.8 Invoking commands            11

10.9 Listening to notifications    11

11 Discovery      11

12 Security considerations          11

Bibliography      11

 

Received on Wednesday, 2 December 2015 18:00:58 UTC