Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8149 - 8160 of 9144
Notice of Intent

Information technology - Home electronic systems...

This part of ISO/IEC 14543-5 specifies the core protocol of IGRS user and device remote access, including intelligent grouping and resource sharing. The protocol features are: a) IGRS RA user and IGRS RA device concepts and...
Notice of Intent

Information technology -- Security techniques...

This part of ISO/IEC 27036 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These...
Notice of Intent

Systems and software engineering - Information...

This document identifies a framework for information technology (IT) project performance benchmarking (e.g. development or maintenance productivity) and related aspects (e.g. data collection and software classification). The...
Notice of Intent

Information technology - Biometric presentation...

This document defines data formats for conveying the mechanism used in biometric presentation attack detection and for conveying the results of presentation attack detection methods. The attacks considered in the ISO/IEC...
Notice of Intent

Information technology - Cloud computing - Cloud...

This document — extends the existing cloud computing vocabulary and reference architecture in ISO/IEC 17788 and ISO/IEC 17789 to describe an ecosystem involving devices using cloud services, — describes the various types of...
Notice of Intent

Information technology - High efficiency coding...

The formats defined in this document enable the interchange, editing, and display of images, as well as the carriage of metadata associated with those images. The Image File Format builds on tools defined in ISO/IEC 14496-12...
Notice of Intent

Information security - Criteria and methodology...

For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies: extended security functional...
Notice of Intent

Information security - Criteria and methodology...

For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series. It...
Notice of Intent

Information security, cybersecurity and privacy...

This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs...
Notice of Intent

Information technology - Business operational...

This document: examines the basic concepts that have been developed for both cloud computing and Open-edi; identifies key Open-edi concepts relevant to cloud computing; identifies key cloud computing concepts relevant to Open...
Notice of Intent

Internet of things (IoT) - Data exchange platform...

This document specifies requirements for an Internet of Things (IoT) data exchange platform for various services in the technology areas of: the middleware components of communication networks allowing the co-existence of IoT...
Notice of Intent

Information security - Criteria and methodology...

For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series. It provides...