Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3253 - 3264 of 5829
Notice of Intent

Information technology - Universal coded character...

This document — specifies the architecture of the UCS; — defines terms used for the UCS; — describes the general structure of the UCS codespace; — specifies the assigned planes of the UCS: the Basic Multilingual Plane (BMP)...
Notice of Intent

Information security - Key management - Part ...

This document specifies mechanisms to establish shared symmetric keys between groups of entities. It defines: — symmetric key-based key establishment mechanisms for multiple entities with a key distribution centre (KDC); and...
Notice of Intent

Processing of health care products - Information...

This document specifies requirements for the information to be provided by the medical device manufacturer for the processing of critical or semi-critical medical devices (i.e. a medical device that enters normally sterile...
Notice of Intent

Cybersecurity - Supplier relationships - Part...

This document provides guidance for product and service acquirers, as well as suppliers of hardware, software and services, regarding: a) gaining visibility into and managing the information security risks caused by...
Notice of Intent

Information technology - High efficiency coding...

This document specifies the Image File Format, an interoperable storage format for a single image, a collection of images, and sequences of images. The format defined in this document is built on tools defined in ISO/IEC...
Notice of Intent

Amendment 2 - Information technology - Security...

Scope for CSA ISO/IEC 20008-2:21 This part of ISO/IEC 20008 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature. It provides — a general...