Search

Refine Results
Type
Program
Status
Country
Province
City
Period range

From

To

Displaying 145 - 156 of 181
Notice of Intent

Information technology - IT asset management - ...

This document specifies requirements and provides guidance for certification bodies providing audit and certification of an ITAMS in accordance with ISO/IEC 19770-1. It does not change the requirements specified in ISO/IEC...
Notice of Intent

Systems and software engineering - Systems and...

This document provides guidance and recommendations for assurance of a selected claim about the system-of-interest by achieving the claim and showing the achievement. The guidance and recommendations are given in a system...
Notice of Intent

Information technology - Data centre facilities...

This document addresses environmental control within data centres based upon the criteria and classifications for “availability”, “security” and “energy efficiency enablement” within ISO/IEC 22237-1. This document specifies...
Notice of Intent

Information security - Time-stamping services...

This document specifies mechanisms that generate, renew, and verify independent time-stamps. In order to verify an independent time-stamp token, time-stamp verifiers do not need access to any other time-stamp tokens. That is...
Notice of Intent

Cybersecurity - Supplier relationships - Part...

This document is an introductory part of ISO/IEC 27036. It provides an overview of the guidance intended to assist organizations in securing their information and information systems within the context of supplier...
Notice of Intent

Information security - Message authentication...

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that...
Notice of Intent

Amendment 1 - Information technology - Security...

Scope: CAN/CSA-ISO/IEC 18033-3:12 (R2016) This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block...