Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 649 - 660 of 9875
Notice of Intent

Information technology - Security techniques - ...

This Standard provides guidance for the management of identity information and for ensuring that an identity management system conforms to ISO/IEC 24760-1 and ISO/IEC 24760-2. This Standard is applicable to an identity...
Notice of Intent

Information Technology - Vocabulary - Part 31...

This part of ISO/IEC 2382 is intended to facilitate international communication in artificial intelligence. It presents , in two languages, terms and definitions of selected concepts relevant to the field of information...
Notice of Intent

Information technology - Multimedia application...

This part of ISO/IEC 23000 specifies the standard representation of the multimedia description information (MPDI) generated and used by an organization in the process of preserving a multimedia asset for the purpose of...
Notice of Intent

Information Technology - Telecommunications and...

This International Standard specifies the signalling protocol for the support of clock synchronization (SYNC-SIG) between Private Integrated Services Network Exchanges (PINXs) connected together within a Private Integrated...
Notice of Intent

Information technology - Telecommunications and...

This International Standard specifies an XML protocol for the services defined in ISO/IEC 18051. It provides an alternative protocol to the ASN.1 based protocol specified in ISO/IEC 18052. In addition to the CSTA-specific...
Notice of Intent

Information Technology - Telecommunications and...

Scope This International Standard specifies the signalling protocol for the support of clock synchronization (SYNC-SIG) between Private Integrated Services Network Exchanges (PINXs) connected together within a Private...
Notice of Intent

Information technology -- Security techniques...

This International Standard provides guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence. This includes processes from...