Refine Results
Displaying 8437 - 8448 of 8636
Notice of Intent
Cards and security devices for personal identification...
This document describes the following: — polling for proximity cards or objects (PICCs) entering the field of a proximity coupling device (PCD); — the byte format, the frames and timing used during the initial phase of...
Notice of Intent
Systems and software engineering - Lifecycle ...
The ISO/IEC 29110 series is applicable to Very Small Entities (VSEs). VSEs are enterprises, organizations, departments or projects having up to 25 people. The lifecycle processes described in the ISO/IEC 29110 series are not...
Notice of Intent
Information technology - Automatic identification...
This part of ISO/IEC 15459 specifies a unique string of characters for the identification of groupings of products, product packages, transport units and items. The character string is intended to be represented in a linear...
Notice of Intent
Information technology - Programming languages...
1 This document specifies the form and establishes the interpretation of programs expressed in the base Fortran language. The purpose of this document is to promote portability, reliability, maintainability, and efficient...
Notice of Intent
Information technology - Security techniques - ...
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: a) the relationships and constraints...
Notice of Intent
Medical suction equipment - Part 3: Suction equipment...
This part of ISO 10079 specifies safety and performance requirements for medical suction equipment powered from a vacuum or positive pressure gas source generating venture suction. It applies to equipment connected to medical...
Notice of Intent
Information technology - Document schema definition...
This part of ISO/IEC 19757 defines a language that is designed to extend the declarative functionality of an XML DTD to include - declaring one or more namespaces to which some or all of the element and attribute names in a...
Notice of Intent
Information technology - Security techniques - ...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for...
Notice of Intent
Information technology for learning, education...
This document defines a model for the recording and exchange of learner achievement information among student information systems (SIS) (also known as student management information systems), as well as the aggregation of...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent
Information Technology - Generic Digital Audio...
This part of ISO/IEC 16500 on .Contours: Technology Domain. describes the system functions and DAVIC tools relevant to the Contours defined in ISO/IEC TR 165001. A goal of this part of ISO/IEC 16500 is to guide implementers...