Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8377 - 8388 of 9284
Notice of Intent

Information technology: Artificial intelligence...

This document defines a set of processes and associated concepts for describing the life cycle of AI systems based on machine learning and heuristic systems. It is based on ISO/IEC/IEEE 15288 and ISO/IEC/IEEE 12207 with...
Notice of Intent

Information technology - Security techniques - ...

This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality...
Notice of Intent

Amendment 1 - Cards and security devices for ...

Scope: CSA ISO/IEC 14443-2 This document specifies the characteristics of the fields to be provided for power and bi-directional communication between proximity coupling devices (PCDs) and proximity cards or objects (PICCs)...
Notice of Intent

Information security - Time-stamping services...

This document specifies mechanisms that generate, renew, and verify independent time-stamps. In order to verify an independent time-stamp token, time-stamp verifiers do not need access to any other time-stamp tokens. That is...
Notice of Intent

Cybersecurity - Supplier relationships - Part...

This document is an introductory part of ISO/IEC 27036. It provides an overview of the guidance intended to assist organizations in securing their information and information systems within the context of supplier...
Notice of Intent

Energy management systems — Guidelines for a ...

This document gives guidance for organizations on establishing a phased approach to implement an energy management system (EnMS). Theis phased approach is intended to support a simplify implementation of an EnMS for all types...
Notice of Intent

Identification cards - Integrated circuit cards...

This document specifies interindustry commands which can be used for security operations. This document also provides informative directives on how to construct security mechanisms with commands defined in ISO/IEC 7816-4. The...
Notice of Intent

Information security - Message authentication...

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that...