Refine Results
Displaying 8461 - 8472 of 9300
Notice of Intent
Information technology - Cloud computing - Cloud...
This document — extends the existing cloud computing vocabulary and reference architecture in ISO/IEC 17788 and ISO/IEC 17789 to describe an ecosystem involving devices using cloud services, — describes the various types of...
Notice of Intent
Information technology - High efficiency coding...
The formats defined in this document enable the interchange, editing, and display of images, as well as the carriage of metadata associated with those images. The Image File Format builds on tools defined in ISO/IEC 14496-12...
Notice of Intent
Information security - Criteria and methodology...
For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies: extended security functional...
Notice of Intent
Information security - Criteria and methodology...
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series. It...
Notice of Intent
Information security, cybersecurity and privacy...
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs...
Notice of Intent
Information technology - Business operational...
This document: examines the basic concepts that have been developed for both cloud computing and Open-edi; identifies key Open-edi concepts relevant to cloud computing; identifies key cloud computing concepts relevant to Open...
Notice of Intent
Internet of things (IoT) - Data exchange platform...
This document specifies requirements for an Internet of Things (IoT) data exchange platform for various services in the technology areas of: the middleware components of communication networks allowing the co-existence of IoT...
Notice of Intent
Information security - Criteria and methodology...
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series. It provides...
Notice of Intent
Information technology - Guidance for the use...
This document describes the regular expression support in SQL (ISO/IEC 9075-2) adopted from the regular expression syntax of XQuery and XPath Functions and Operators 3.1, which is derived from Perl. This document discusses...
Notice of Intent
Information technology - Guidance for the use...
This document describes the support in SQL for time-related information. This document discusses the following features of the SQL language: Time-related data types Operations on time-related data Time-related Predicates...
Notice of Intent
Information technology - Guidance for the use...
This document describes the support for the use of SQL within programs written in Java. This document discusses the following features of the SQL language: The embedding of SQL expressions and statements in programs written...
Notice of Intent
Information technology - Guidance for the use...
This document provides a tutorial of SQL routines and types using the Java™ programming language. This document discusses the following features of the SQL Language: The use of routines written in the Java programming...