Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8725 - 8736 of 8817
Notice of Intent

Information technology - Process assessment - ...

This Technical Specification: defines a process assessment model (PAM) that meets the requirements of ISO/IEC 33004 and that supports the performance of an assessment of process capability by providing indicators for guidance...
Notice of Intent

Information Technology - Home Electronic System...

This part of ISO/IEC 14543 presents methods for overall building management of the home electronic system (HES) architecture. The interaction of building and home control systems requires a demarcation between building...
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 specifies the syntax and semantics of a Rights Expression Language. This part of ISO/IEC 21000 does not give any permission, including permissions about who is legally or technically allowed to...
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 describes a Rights Data Dictionary which comprises a set of clear, consistent, structured, integrated and uniquely identified Terms (as defined in Clause 5.4) to support the MPEG-21 Rights...
Notice of Intent

Information Technology - Multimedia Framework...

1.1 Introduction MPEG-21 will provide an over-arching framework within which many elements of multimedia are brought together. In particular, coded representations of content will be juxtaposed with metadata descriptors and...
Notice of Intent

Security for industrial automation and control...

This part of IEC 62443, which is a Technical Report, describes requirements for asset owners and industrial automation and control system (IACS) product suppliers that have established and are now maintaining an IACS patch...
Notice of Intent

Information security - Key management - Part ...

This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use...
Information technology - Business Operational View - Part 5: Identification and referencing of requirements of jurisdictional domains assources of external constraints
1 Scope 1.1 Statement of scope The modelling of a business transaction through scenarios and scenario components is done by specifying the applicable constraints through explicitly stated rules. The Open-edi Reference Model...
Notice of Intent

Information technology - Coding of audio-visual...

This part of ISO/IEC 14496 specifies the storage format for AVC (ISO/IEC 14496-10) video streams. The storage of AVC content uses the existing capabilities of the ISO base media file format but also defines extensions to...