Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 6325 - 6336 of 12009
Notice of Intent

Information technology - Business operational...

This part of ISO/IEC 15944 provides a set of UML class diagrams and conceptual explanations that circumscribe the Open-edi Business Transaction Ontology (OeBTO). It explains the mechanics of a business transaction state...
Notice of Intent

Energy management systems — Guidelines for a ...

This document gives guidance for organizations on establishing a phased approach to implement an energy management system (EnMS). Theis phased approach is intended to support a simplify implementation of an EnMS for all types...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block ciphers are defined. They are categorized in...
Notice of Intent

Software engineering - COSMIC: a functional size...

This International Standard specifies the set of definitions, conventions and activities of the COSMIC Functional Size Measurement Method. It is applicable to software from the following functional domains: a) application...
Notice of Intent

Information technology - Programming languages...

This Technical Report specifies a series of extensions of the programming language C, specified by International Standard ISO/IEC 9899:1999. These extensions can be useful in the mitigation of security vulnerabilities in...
Notice of Intent

Information technology - Programming languages...

This Technical Report specifies an extension to the programming language C, specified by the International Standard ISO/IEC 9899:1999. The extension provides support for decimal floating-point arithmetic that is intended to...
Notice of Intent

Identification cards - Integrated circuit cards...

This document specifies interindustry commands which can be used for security operations. This document also provides informative directives on how to construct security mechanisms with commands defined in ISO/IEC 7816-4. The...
Notice of Intent

Information security - Message authentication...

This document specifies MAC algorithms that use a secret key and a hash-function (or its round-function or sponge function) to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that...