Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 3829 - 3840 of 6436
Notice of Intent

Information technology - Concepts and usage of...

This document provides a usage scenario that utilizes the facilities defined in ISO/IEC 11179-3, ISO/IEC 19763-5 and ISO/IEC 19763-10 to demonstrate the registration of the mapping between process models. The availability of...
Committee

MC/ISO/TC 282

Standardization of water reuse of any kind and for any purpose. It covers both centralized and decentralized or on-site water reclamation, and direct and indirect reuse applications, taking into consideration the potential...
Notice of Intent

Safety requirements for electrical equipment ...

Scope: 1 Scope and object This clause of Part 1 is applicable except as follows: 1.1.1 Equipment included in scope Replacement: Replace the second paragraph by the following: This part of IEC 61010 specifies safety...
Notice of Intent

Information technology - Programming languages...

1 This document specifies the form and establishes the interpretation of programs written in the C programming language.1) It specifies — the representation of C programs; — the syntax and constraints of the C language; — the...
Notice of Intent

IT Security techniques - Hash-functions - Part...

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash- functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving...
Notice of Intent

IT Security techniques - Digital signatures with...

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature with appendix mechanism, and...
Notice of Intent

Information technology - Security techniques - ...

This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality...
Notice of Intent

Information technology - Security techniques - ...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Information security, cybersecurity and privacy...

This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes...
Notice of Intent

Information technology - Security techniques - ...

This document establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in line with the privacy principles in ISO/IEC 29100 for...