Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8101 - 8112 of 9145
Notice of Intent

Information technology - Storage management - ...

This Technical Specification defines an interface for the secure, extensible, and interoperable management of a distributed and heterogeneous storage system. This interface uses an object-oriented, XML-based, messaging-based...
Notice of Intent

Information technology - Storage management - ...

The Storage Management Technical Specification, Part 6 Fabric defines management profiles for Autonomous (top level) profiles for programs and devices whose central function is providing support for storage networking. This...
Notice of Intent

Information technology - Storage management - ...

This version of the specification models various details of the following objects of the media library for monitoring. • Library • Drives • Changer Devices • Slots • IO Slots • SCSI Interfaces and SCSI and FC Target Ports •...
Notice of Intent

Systems and software engineering - Lifecycle ...

This document provides a profile specification for the organizational management profile. The organizational management profile applies to VSEs involved in systems engineering and/or software engineering development. This...
Notice of Intent

Information technology - Storage management - ...

This Technical Specification defines an interface for the secure, extensible, and interoperable management of a distributed and heterogeneous storage system. This interface uses an object-oriented,XML-based, messaging-based...
Notice of Intent

Amendment 1 - Information technology - Security...

This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block ciphers specified in ISO/IEC 18033-3 and...
Notice of Intent

Amendment 1 - Information technology - Security...

This part of ISO/IEC 20008 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature. It provides — a general description of an anonymous digital...
Notice of Intent

Information security, cybersecurity and privacy...

This document provides a framework for identifying and mitigating re-identification risks and risks associated with the lifecycle of de-identified data. This document is applicable to all types and sizes of organizations...