Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 7849 - 7860 of 8695
Notice of Intent

Information technology - Metadata registries (...

1.1 Statement of scope This part of ISO/IEC 11179 defines the type of information to be specified, the conditions to be met, and the procedure(s) to be followed for each metadata item to be registered in a metadata registry...
Notice of Intent

Textiles—Determination of Formaldehyde—Part 1...

This part of ISO 14184 specifies a method for determining the amount of free formaldehyde and formaldehyde extracted partly through hydrolysis by means of a water extraction method. The method can be applied to the testing of...
Notice of Intent

Standard for wind turbine tower elevators

ASME A17.8/CSA B44.8 applies to elevators permanently installed in a wind turbine tower to provide vertical transportation of authorized personnel and their tools and equipment only. Such elevators are typically subjected to...
Notice of Intent

Energy management systems — Guidelines for a ...

This document gives guidance for organizations on establishing a phased approach to implement an energy management system (EnMS). Theis phased approach is intended to support a simplify implementation of an EnMS for all types...
Notice of Intent

Information security - Time-stamping services...

This document specifies mechanisms that generate, renew, and verify independent time-stamps. In order to verify an independent time-stamp token, time-stamp verifiers do not need access to any other time-stamp tokens. That is...
Notice of Intent

Cybersecurity - Supplier relationships - Part...

This document is an introductory part of ISO/IEC 27036. It provides an overview of the guidance intended to assist organizations in securing their information and information systems within the context of supplier...
Notice of Intent

Identification cards - Integrated circuit cards...

This document specifies interindustry commands which can be used for security operations. This document also provides informative directives on how to construct security mechanisms with commands defined in ISO/IEC 7816-4. The...
Notice of Intent

Information security - Message authentication...

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that...