Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 1249 - 1260 of 11546
Notice of Intent

Information Technology - Multimedia Framework...

This part of ISO/IEC 21000 describes a Rights Data Dictionary which comprises a set of clear, consistent, structured, integrated and uniquely identified Terms (as defined in Clause 5.4) to support the MPEG-21 Rights...
Notice of Intent

Information Technology - Processing Languages...

.1 This International Standard defines a language for the specification of electronic documents, comprised of black and white, gray scale, or full color text, images, and geometric graphics, in a form suitable for...
Notice of Intent

Information Technology - Home Electronic System...

This part of ISO/IEC 14543 establishes general principles for network and device management shared by all installation modes for network based control of HES Class 1 and independent of the installation mode used. The aim is...
Information technology - Radio frequency identification for item management - Part 1: Reference architecture and definition of parameters to be standardized
1.1 This part of ISO/IEC 18000 defines the generic architecture concepts in which item identification may commonly be required within the logistics and supply chain and defines the parameters that need to be determined in any...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Notice of Intent

Information technology - Security techniques - ...

1 Scope This International Standard specifies the Systems Security Engineering – Capability Maturity Model® (SSE-CMM®). The SSE-CMM® is a process reference model focused upon the requirements for implementing security in a...
Notice of Intent

Information technology - Security techniques - ...

Scope The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of...