Refine Results
Displaying 121 - 132 of 339
Publications
SCC’s Member Code of Conduct
This document establishes the expectations for the conduct of members participating in international standardization.
Notice of Intent
Information technology - Big data reference architecture...
This document specifies the big data reference architecture (BDRA). The reference architecture includes concepts and architectural views. The reference architecture specified in this document defines two architectural...
Information Technology - Open Systems Interconnection - Structure of Management Information: Requirements and Guidelines for Implementation Conformance Statement Proformas Associated with OSI Management
This Recommendation / International Standard provides requirements and guidelines for Management Conformance Summary (MCS) proformas, Management Information Conformance Statement (MICS) proformas, Managed Object Conformance...
Notice of Intent
Information Technology - Security Techniques - ...
Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and...
Publications
Beyond Disclosure: Driving Performance & Trust...
Getting beyond greenwashing through standardization Environmental, Social and Governance performance (or ESG) is an increasingly important topic amongst organizations around the world, driven in large part by growing consumer...
Notice of Intent
Information technology -- UPnP Device Architecture...
This service definition is compliant with [1]. It defines a service type referred to herein as Messaging service. The Messaging service is a UPnP service that allows control points to use the messaging features provided by a...
Notice of Intent
Information technology - UPnP Device Architecture...
This service definition is compliant with [1]. It defines a service type referred to herein as Messaging service. The Messaging service is a UPnP service that allows control points to use the messaging features provided by a...
Notice of Intent
Information Technology - Security Techniques - ...
Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and...
Notice of Intent
Information technology - Application security...
This document defines XML Schemas that implement the minimal set of information requirements and essential attributes of ASCs and the activities and roles of the Application Security Life Cycle Reference Model (ASLCRM) from...
Notice of Intent
Information technology - Application security...
This document defines XML Schemas that implement the minimal set of information requirements and essential attributes of ASCs and the activities and roles of the Application Security Life Cycle Reference Model (ASLCRM) from...
Notice of Intent
Information technology - Security techniques - ...
This document provides a privacy framework which: - specifies a common privacy terminology; - defines the actors and their roles in processing personally identifiable information (PII); - describes privacy safeguarding...
Notice of Intent
Information technology - Guidance for the use...
This document describes the definition and use of multidimensional arrays in SQL. Multidimensional arrays represent a core underlying structure of manifold science and engineering data. It is generally recognized today...