Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 2233 - 2244 of 9886
Notice of Intent

Information technology - Security techniques - ...

This International Standard specifies the non-invasive attack mitigation test metrics for determining conformance to the requirements specified in ISO/IEC 19790 for Security Levels 3 and 4. The test metrics are associated...
Notice of Intent

Information technology - Cloud computing - Cloud...

This document — extends the existing cloud computing vocabulary and reference architecture in ISO/IEC 17788 and ISO/IEC 17789 to describe an ecosystem involving devices using cloud services — describes the various types of...
Notice of Intent

Information technology - Service management - ...

This document specifies requirements and provides guidance for certification bodies providing audit and certification of an SMS in accordance with ISO/IEC 20000-1. It does not change the requirements specified in ISO/IEC...
Notice of Intent

Information technology - Small Computer System...

This standard defines the protocol layer of the Serial Attached SCSI (SAS) interconnect and three transport protocols that use the SAS interconnect: a) Serial SCSI Protocol (SSP): a mapping of SCSI supporting multiple...
Notice of Intent

Information technology - Small computer system...

This part of ISO/IEC 14776 defines the command set extensions to facilitate operation of SCSI direct access block devices. The clauses in this standard, implemented in conjunction with the applicable clauses of SPC-4, specify...
Notice of Intent

Information Technology - Small Computer System...

This part of ISO/IEC 14776 defines the command set extensions for operation of SCSI medium changer devices and command set extensions that allow medium changer functions in other types of SCSI devices. This SCSI-3 Medium...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. This part of ISO/IEC 9797 can be applied to the security services of any security architecture...