Search

Refine Results
Type
Status
Period range

From

To

Displaying 109 - 120 of 298
Notice of Intent

Information technology -- Security techniques...

This International Standard defines the structure and the data elements of Authentication Context for Biometrics (ACBio), which is used for checking the validity of the result of a biometric verification process executed at a...
Notice of Intent

Information technology - Security techniques - ...

Scope: CAN/CSA-ISO/IEC 18033-4:13 (R2017) This part of ISO/IEC 18033 specifies a) output functions to combine a keystream with plaintext, b) keystream generators for producing keystream, and c) object identifiers assigned to...
Notice of Intent

Information technology - Security techniques - ...

This International Standard provides guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence. This includes processes from...
Notice of Intent

Information technology - Security techniques - ...

This Technical Report provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408. It is also applicable to...
Notice of Intent

Information technology - Security techniques - ...

This International Standard provides guidelines in addition to the guidance given in the ISO/IEC 27000 family of standards for implementing information security management within information sharing communities. This...
Notice of Intent

Information technology - Security techniques - ...

This document defines the structure and the data elements of Authentication Context for Biometrics (ACBio), which is used for checking the validity of the result of a biometric enrolment and verification process executed at a...
Notice of Intent

Amendment 1 - Information technology - Security...

Scope: CAN/CSA-ISO/IEC 18033-3:12 (R2016) This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k kits. A total of seven different block...
Notice of Intent

Information technology - Security techniques - ...

This document provides cloud service customers and cloud service providers with guidance on a) gaining visibility into the information security risks associated with the use of cloud services and managing those risks...