Search

Refine Results
Type
Program
Status
Country
Province
City
Period range

From

To

Displaying 8521 - 8532 of 8619
Notice of Intent

Information technology - Process assessment - ...

This Technical Specification: defines a process assessment model (PAM) that meets the requirements of ISO/IEC 33004 and that supports the performance of an assessment of process capability by providing indicators for guidance...
Notice of Intent

Information Technology - Home Electronic System...

This part of ISO/IEC 14543 presents methods for overall building management of the home electronic system (HES) architecture. The interaction of building and home control systems requires a demarcation between building...
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 specifies the syntax and semantics of a Rights Expression Language. This part of ISO/IEC 21000 does not give any permission, including permissions about who is legally or technically allowed to...
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 describes a Rights Data Dictionary which comprises a set of clear, consistent, structured, integrated and uniquely identified Terms (as defined in Clause 5.4) to support the MPEG-21 Rights...
Notice of Intent

Information Technology - Multimedia Framework...

1.1 Introduction MPEG-21 will provide an over-arching framework within which many elements of multimedia are brought together. In particular, coded representations of content will be juxtaposed with metadata descriptors and...
Notice of Intent

Security for industrial automation and control...

This part of IEC 62443, which is a Technical Report, describes requirements for asset owners and industrial automation and control system (IACS) product suppliers that have established and are now maintaining an IACS patch...
Notice of Intent

Information security - Key management - Part ...

This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use...
Notice of Intent

Information technology - Information security...

1 Scope This document provides guidelines to plan and prepare for incident response and to learn lessons from incident response. The guidelines are based on the “plan and prepare” and “learn lessons” phases of the information...