Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 6241 - 6252 of 6358
Notice of Intent

Information technology - Programming languages...

1 This document specifies the form and establishes the interpretation of programs expressed in the base Fortran language. The purpose of this document is to promote portability, reliability, maintainability, and efficient...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: a) the relationships and constraints...
Notice of Intent

Safety requirements for electrical equipment ...

This clause of Part 1 is applicable except as follows: 1.1 Scope 1.1.1 Equipment included in scope Replacement: Replace the text, except the first paragraph, with the following new text: This part of IEC 61010 applies to...
Notice of Intent

Information technology - Security techniques - ...

This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent

Information Technology - Metadata Registries (...

1. Scope This part of ISO/IEC 11179 provides instruction for naming and identification of the following administered items: data element c oncept, conceptual domain, data element, and value domain. It describes the parts and...
Notice of Intent

Information Technology - Generic Digital Audio...

This part of ISO/IEC 16500 on .Contours: Technology Domain. describes the system functions and DAVIC tools relevant to the Contours defined in ISO/IEC TR 165001. A goal of this part of ISO/IEC 16500 is to guide implementers...
Notice of Intent

Information Technology - Generic Digital Audio...

This part of ISO/IEC 16500 describes the management architecture and protocol for managing the DAVIC System. The DAVIC system management architecture is the TMN-based (Telecommunication Management Network) architecture...
Notice of Intent

Information Technology - 8-Bit Single-Byte Coded...

This part of ISO/IEC 8859 specifies a set of 191 coded graphic characters identified as Latin alphabet No. 1. This set of coded graphic characters is intended for use in data and text processing applications and also for...