Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8173 - 8184 of 9145
Notice of Intent

Systems and software engineering - Information...

This document identifies a framework for information technology (IT) project performance benchmarking (e.g. development or maintenance productivity) and related aspects (e.g. data collection and software classification). The...
Notice of Intent

Information technology - Biometric presentation...

This document defines data formats for conveying the mechanism used in biometric presentation attack detection and for conveying the results of presentation attack detection methods. The attacks considered in the ISO/IEC...
Notice of Intent

Information technology - Cloud computing - Cloud...

This document — extends the existing cloud computing vocabulary and reference architecture in ISO/IEC 17788 and ISO/IEC 17789 to describe an ecosystem involving devices using cloud services, — describes the various types of...
Notice of Intent

Information technology - High efficiency coding...

The formats defined in this document enable the interchange, editing, and display of images, as well as the carriage of metadata associated with those images. The Image File Format builds on tools defined in ISO/IEC 14496-12...
Notice of Intent

Information security - Criteria and methodology...

For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies: extended security functional...
Notice of Intent

Information security - Criteria and methodology...

For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series. It...
Notice of Intent

Information security, cybersecurity and privacy...

This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs...
Notice of Intent

Information technology - Business operational...

This document: examines the basic concepts that have been developed for both cloud computing and Open-edi; identifies key Open-edi concepts relevant to cloud computing; identifies key cloud computing concepts relevant to Open...
Notice of Intent

Internet of things (IoT) - Data exchange platform...

This document specifies requirements for an Internet of Things (IoT) data exchange platform for various services in the technology areas of: the middleware components of communication networks allowing the co-existence of IoT...
Notice of Intent

Information security - Criteria and methodology...

For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series. It provides...
Notice of Intent

Information technology - Guidance for the use...

This document describes the regular expression support in SQL (ISO/IEC 9075-2) adopted from the regular expression syntax of XQuery and XPath Functions and Operators 3.1, which is derived from Perl. This document discusses...
Notice of Intent

Information technology - Guidance for the use...

This document describes the support in SQL for time-related information. This document discusses the following features of the SQL language: Time-related data types Operations on time-related data Time-related Predicates...