Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 5485 - 5496 of 10864
Notice of Intent

Information technology - Security techniques - ...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Information technology - Security techniques - ...

1 Scope (there is a diagram that's part of the scope that isn't attached) To prove ownership of an ITU-T X.509 certificate registered individually with the registration authority (RA), a biometric hardware security module has...
Notice of Intent

Explosive atmospheres - Part 25: Intrinsically...

This part of IEC 60079 contains the specific requirements for construction and assessment of intrinsically safe electrical systems, type of protection "i", intended for use, as a whole or in part, in locations in which the...
Notice of Intent

Information technology -- Security techniques...

This part of ISO/IEC 27033 describes the threats, design techniques and control issues associated with reference network scenarios. For each scenario, it provides detailed guidance on the security threats and the security...
Notice of Intent

Information technology -- Security techniques...

This part of ISO/IEC 27033 gives guidance for securing communications between networks using security gateways (firewall, application firewall, Intrusion Protection System, etc.) in accordance with a documented information...
Notice of Intent

Information technology - Security techniques - ...

This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality...
Notice of Intent

Information technology - Home electronic systems...

This part of ISO/IEC 14543-5 specifies the core protocol of IGRS user and device remote access, including intelligent grouping and resource sharing. The protocol features are: a) IGRS RA user and IGRS RA device concepts and...
Notice of Intent

Information technology - Small computer system...

This part of ISO/IEC 14776 defines the command set extensions to facilitate operation of SCSI direct access block devices. The clauses in this standard, implemented in conjunction with the applicable clauses of SPC-4, specify...
Notice of Intent

Information technology -- Security techniques...

This part of ISO/IEC 27036 specifies fundamental information security requirements for defining, implementing, operating, monitoring, reviewing, maintaining and improving supplier and acquirer relationships. These...
Notice of Intent

Information technology -- Security techniques...

This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are “fit for purpose”. It encapsulates best practice on defining...