Search

Refine Results
Type
Program
Status
Country
Province
City
Period range

From

To

Displaying 5317 - 5328 of 5417
Notice of Intent

Information Technology - Security Techniques - ...

Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and...
Notice of Intent

Information Processing - SGML Support Facilities...

This Technical Report complements ISO 8879 by providing additional tutorial information. It is not intended, and should not be regarded, as an extension, modification, or interpretation of ISO 8879. The SGML language contains...
Notice of Intent

Systems and software engineering - Life cycle...

This document provides a common framework for planning and controlling the technical processes and activities to produce and sustain software products. The complete life cycle is covered by this document, from idea conception...
Notice of Intent

Information technology - Open document format...

1.1 Introduction This document defines an XML schema for office applications and its semantics. The schema is suitable for office documents, including text documents, spreadsheets, charts and graphical documents like drawings...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 27033 describes the threats, design techniques and control issues associated with reference network scenarios. For each scenario, it provides detailed guidance on the security threats and the security...
Notice of Intent

Switches for appliances - Part 2-6: Particular...

Clause 1 of IEC 61058-1:2016 is applicable except as follows. Addition: This part of IEC 61058 is a subset based on IEC 61058-1. The clauses outlined below are intended to address the specific requirements for switches...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent

Information Technology - Generic Digital Audio...

This part of ISO/IEC 16500 on .Contours: Technology Domain. describes the system functions and DAVIC tools relevant to the Contours defined in ISO/IEC TR 165001. A goal of this part of ISO/IEC 16500 is to guide implementers...
Notice of Intent

Information Technology - Generic Digital Audio...

This part of ISO/IEC 16500 describes the management architecture and protocol for managing the DAVIC System. The DAVIC system management architecture is the TMN-based (Telecommunication Management Network) architecture...