Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 5305 - 5316 of 6119
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18014: - identifies the objective of a time-stamping authority; - describes a general model on which time-stamping services are based; - defines time-stamping services; - defines the basic protocols...
Notice of Intent

Information technology - Security techniques - ...

This document specifies security guidelines for the design and implementation of VSs. Design considerations focusing on identifying and mitigating risks, and implementation recommendations with respect to typical VSs are...
Notice of Intent

Information technology - Application security...

This document defines XML Schemas that implement the minimal set of information requirements and essential attributes of ASCs and the activities and roles of the Application Security Life Cycle Reference Model (ASLCRM) from...
Notice of Intent

Information technology - Security techniques - ...

This document: — gives guidelines for the identity proofing of a person; — specifies levels of identity proofing, and requirements to achieve these levels. This document is applicable to identity management systems.
Notice of Intent

Information technology - Security techniques - ...

This document defines a privacy architecture framework that: — specifies concerns for ICT systems that process PII; — lists components for the implementation of such systems; and — provides architectural views contextualizing...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of...
Notice of Intent

Information technology - Guidelines, methodology...

This Technical Report (TR) defines a methodology and a guided check-list for evaluation of cultural adaptability in software, hardware and other information technology (IT) products. The check-list and guidelines are not only...