Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 1969 - 1980 of 9886
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Information Technology - Open Systems Interconnection - Systems Management: Management Knowledge Management Function
This Recommendation 1 International Standard defines the Management knowledge management function. The Management knowledge management function is a Systems Management function which may be used by an application process in a...
Notice of Intent

Information Technology - Multimedia Framework...

This Part of ISO/IEC 21000, entitled Digital Item Processing (DIP), specifies the syntax and semantics of tools that may be used to process Digital Items. The tools provide a normative set of tools that specify the processing...
Notice of Intent

Information Technology - Security Techniques - ...

Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and...
Notice of Intent

Information technology - Programming languages...

This International Standard specifies the syntax and semantics of COBOL. Its purpose is to promote a high degree of machine independence to permit the use of COBOL on a variety of data processing systems. This International...
Notice of Intent

Information technology - ASN.1 encoding rules...

This Recommendation | International Standard specifies two Versions of a mapping from any XSD Schema into an ASN.1 schema. The ASN.1 schema for both Versions support the same semantics and validate the same set of XML...
Notice of Intent

Information Technology - Computer Graphics and...

Scope This International Standard defines the encoding rules which shall apply to the representation of IPI-IIF image data. The IPI-IIF data format is defined in ISO/IEC 12087-3, called "Image Interchange Facility (IIF)". It...
Notice of Intent

Information technology - Security techniques - ...

This International Standard provides guidelines for specific activities in handling digital evidence, which are identification, collection, acquisition and preservation of digital evidence that may be of evidential value...
Notice of Intent

Information security, cybersecurity and privacy...

This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target...
Notice of Intent

Information technology - Systems and software...

This document defines quality measures useful for requirements and evaluation of IT service quality in terms of characteristics and sub-characteristics defined in ISO/IEC TS 25011. This document contains a basic set of...