Information technology - OpenID connect - OpenID connect core 1.0 incorporating errata set 2
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner.
This document defines the core OpenID Connect functionality: authentication built on…
Information technology — OpenID connect — OpenID connect core 1.0 incorporating errata set 2
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner.
This document defines the core OpenID Connect functionality: authentication built on…
Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment...
This document provides guidelines for identity-related risk, as an extension of ISO 31000:2018. More specifically, it uses the process outlined in ISO 31000 to guide users in establishing context and assessing risk, including providing risk scenarios for processes and implementations that are exposed to identity-related risk.
This document is applicable to the risk assessment of processes and…
Information security, cybersecurity and privacy protection - Application of ISO 31000 for assessment...
This document provides guidelines for identity-related risk, as an extension of ISO 31000:2018. More specifically, it uses the process outlined in ISO 31000 to guide users in establishing context and assessing risk, including providing risk scenarios for processes and implementations that are exposed to identity-related risk.
This document is applicable to the risk assessment of processes and…
Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.
Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.
Health informatics — Workforce roles and capabilities for terminology and terminology services in he...
This document specifies the tasks, roles, and key skills, requirements and competencies for personnel involved in terminology services in healthcare organizations.
This document specifies:
— terminology services in healthcare organizations including the selection, authoring, and deployment and use of terminology subsets, data sets and maps; developing and managing terminology management…
Information technology — Business operational view — Part 17: Fundamental principles and rules gover...
This document:
a) focuses on PbD aspects of privacy protection requirements as external constraints on any type of Person, (e.g. organization or public administration) involved in any kind of business transaction among such Persons which involves the electronic data interchange (EDI) of any personal information;
b) establishes a fundamental set of privacy principles known as Privacy…
Information technology - Business operational view - Part 17: Fundamental principles and rules gover...
This document:
a) focuses on PbD aspects of privacy protection requirements as external constraints on any type of Person, (e.g. organization or public administration) involved in any kind of business transaction among such Persons which involves the electronic data interchange (EDI) of any personal information;
b) establishes a fundamental set of privacy principles known as Privacy…
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hard...
This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target entity, objective pattern, and method of deployment. Moreover, this document summarizes the possible ways of utilizing monitoring technologies for hardware security…