Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 6265 - 6276 of 6350
Notice of Intent

Information technology - Security techniques - ...

This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...
Notice of Intent

Information technology - Guidance for biometric...

This document consolidates information relating to successful, secure and usable implementation of biometric enrolment processes, while indicating risk factors that organisations proposing to use biometric technologies will...
Notice of Intent

Information Technology - Coding of Multimedia...

1.1 Context of the Scope ISO/IEC 13522 specifies the coded representation of multimedia/hypermedia information objects (MHEG objects) for interchange as final form units within or across services and applications, by any...
Notice of Intent

Information technology - Security techniques - ...

Scope The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of...
Notice of Intent

Systems and software engineering — Information...

This part of ISO/IEC 29155 provides general requirements and guidance for reporting processes and contents of typical reports within benchmarking activities of the information technology (IT) project performance benchmarking...
Notice of Intent

Safety of machinery - Safety distances to prevent...

This document establishes values for safety distances in both industrial and non-industrial environments to prevent machinery hazard zones being reached. The safety distances are appropriate for protective structures. It also...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared...
Notice of Intent

Information Technology - Home Electronic System...

This part of ISO/IEC 14543 presents methods for overall building management of the home electronic system (HES) architecture. The interaction of building and home control systems requires a demarcation between building...
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 specifies the syntax and semantics of a Rights Expression Language. This part of ISO/IEC 21000 does not give any permission, including permissions about who is legally or technically allowed to...
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 describes a Rights Data Dictionary which comprises a set of clear, consistent, structured, integrated and uniquely identified Terms (as defined in Clause 5.4) to support the MPEG-21 Rights...