Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 5737 - 5748 of 6428
Notice of Intent

Information technology - Security techniques - ...

This document specifies security guidelines for the design and implementation of VSs. Design considerations focusing on identifying and mitigating risks, and implementation recommendations with respect to typical VSs are...
Notice of Intent

Information technology - Application security...

This document defines XML Schemas that implement the minimal set of information requirements and essential attributes of ASCs and the activities and roles of the Application Security Life Cycle Reference Model (ASLCRM) from...
Notice of Intent

Information technology - Security techniques - ...

This document: — gives guidelines for the identity proofing of a person; — specifies levels of identity proofing, and requirements to achieve these levels. This document is applicable to identity management systems.
Notice of Intent

Information technology - Security techniques - ...

This document defines a privacy architecture framework that: — specifies concerns for ICT systems that process PII; — lists components for the implementation of such systems; and — provides architectural views contextualizing...