Refine Results
Displaying 73 - 84 of 391
Notice of Intent
Information Technology - Security Techniques - ...
1. Scope This International Standard specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms. Firstly, this International Standard specifies methods for testing whether...
Information technology - Security techniques - Systems security engineering - Capability maturity model (SSE-CMM)
This International Standard specifies the Systems Security Engineering - Capability Maturity Model® (SSE-CMM®). The SSE-CMM® is a process reference model focused upon the requirements for implementing security in a system or...
Notice of Intent
Information technology - Security techniques - ...
1 Scope This International Standard specifies the Systems Security Engineering – Capability Maturity Model® (SSE-CMM®). The SSE-CMM® is a process reference model focused upon the requirements for implementing security in a...
Notice of Intent
Amendment 2 - Information technology - Security...
This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent
Information technology - Security techniques - ...
This International Standard specifies the Systems Security Engineering - Capability Maturity Model® (SSE-CMM®). The SSE-CMM® is a process reference model focused upon the requirements for implementing security in a system or...
Notice of Intent
Information technology - Biometric application...
This document defines the Application Programming Interface (API) and Service Provider Interface (SPI) for standard interfaces within a biometric system that support the provision of that biometric system using components...
Notice of Intent
Information technology - Biometric application...
This document defines the Application Programming Interface (API) and Service Provider Interface (SPI) for standard interfaces within a biometric system that support the provision of that biometric system using components...
Notice of Intent
Information technology - Security techniques - ...
This International Standard provides detailed technical guidance on how organizations can define an appropriate level of risk mitigation by employing a well-proven and consistent approach to the planning, design...
Notice of Intent
Information technology -- Security techniques...
This International Standard provides detailed technical guidance on how organizations can define an appropriate level of risk mitigation by employing a well-proven and consistent approach to the planning, design...
Notice of Intent
Information Technology - Computer Graphics and...
This part of ISO/IEC 12087 facilitates the interchange of digital images. For this purpose, conceptual, architectural, and functional definitions of the Image Interchange Facility (IPI- IIF) are established. ISO/IEC 12087-3...
Notice of Intent
Information Technology - Computer Graphics and...
Scope This part of ISO/IEC 12087 facilitates the interchange of digital images. For this purpose, conceptual, architectural, and functional definitions of the Image Interchange Facility (IPI- IIF) are established. ISO/IEC...
Notice of Intent
Information technology - Security techniques - ...
This document provides recommendations and checklists which can be used to support the specification and operational testing of cryptographic modules in their operational environment within an organization’s security system...