Refine Results
Displaying 3829 - 3840 of 6436
Notice of Intent
Information technology - Concepts and usage of...
This document provides a usage scenario that utilizes the facilities defined in ISO/IEC 11179-3, ISO/IEC 19763-5 and ISO/IEC 19763-10 to demonstrate the registration of the mapping between process models. The availability of...
Notice of Intent
Information technology - Security techniques - ...
This document provides guidance on reviewing and assessing the implementation and operation of information security controls, including the technical assessment of information system controls, in compliance with an...
Committee
MC/ISO/TC 282
Standardization of water reuse of any kind and for any purpose. It covers both centralized and decentralized or on-site water reclamation, and direct and indirect reuse applications, taking into consideration the potential...
Notice of Intent
Safety requirements for electrical equipment ...
Scope: 1 Scope and object This clause of Part 1 is applicable except as follows: 1.1.1 Equipment included in scope Replacement: Replace the second paragraph by the following: This part of IEC 61010 specifies safety...
Notice of Intent
Information technology - Programming languages...
1 This document specifies the form and establishes the interpretation of programs written in the C programming language.1) It specifies — the representation of C programs; — the syntax and constraints of the C language; — the...
Notice of Intent
IT Security techniques - Hash-functions - Part...
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash- functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving...
Notice of Intent
IT Security techniques - Digital signatures with...
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature with appendix mechanism, and...
Notice of Intent
Information technology - Security techniques - ...
This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality...
Notice of Intent
Information technology - Security techniques - ...
1 Scope This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data...
Notice of Intent
Information technology - Security techniques - ...
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent
Information security, cybersecurity and privacy...
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes...
Notice of Intent
Information technology - Security techniques - ...
This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for...