Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 371 - 380 of 392
Information technology — Genomic information representation — Part 3: Metadata and application progr...
This document specifies information metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces of genomic information. It defines: —    metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 (in Clause 6); —    protection elements providing confidentiality, integrity and privacy rules at the different…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.040.99
Information technology — Business operational view — Part 8: Identification of privacy protection re...
ISO/IEC 15944-8:2012 has been developed to support modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of information and communications technology (ICT) based business transaction where the individual has the role of a buyer. It provides users and designers with a methodology and tools addressing requirements…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.240.63
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — M...
This document defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC 15408 series evaluation, using the criteria and evaluation evidence defined in the ISO/IEC 15408 series.
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document defines the assurance requirements of the ISO/IEC 15408 series. It includes the individual assurance components from which the evaluation assurance levels and other packages contained in ISO/IEC 15408-5 are composed, and the criteria for evaluation of Protection Profiles (PPs), PP-Configurations, PP-Modules, and Security Targets (STs).
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document provides a standardized framework for specifying objective, repeatable and reproducible evaluation methods and evaluation activities. This document does not specify how to evaluate, adopt, or maintain evaluation methods and evaluation activities. These aspects are a matter for those originating the evaluation methods and evaluation activities in their particular area of interest.
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document provides packages of security assurance and security functional requirements that have been identified as useful in support of common usage by stakeholders. EXAMPLE        Examples of provided packages include the evaluation assurance levels (EAL) and the composed assurance packages (CAPs). This document presents: —    evaluation assurance level (EAL) family of packages that specify…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products. This document provides an overview of all parts of the ISO/IEC 15408 series. It describes the various parts of the…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — P...
This document defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that meets the common security functionality requirements of many IT products.
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Security and resilience — Authenticity, integrity and trust for products and documents — Framework f...
This document provides an approach that support stakeholders in a supply chain to accomplish a chain of trust regarding properties of identifiable material goods along a supply chain. This document gives guidance on the identification of trust domains and their corresponding trustworthiness attributes, and the measures to achieve the targeted trustworthiness attributes. As a supply chain…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
03.100.01
Electronic fee collection — Requirements for EFC application interfaces on common media
This document defines requirements to support information exchanges among related entities of a common payment scheme. It defines: a) electronic fee collection (EFC) functional requirements for a common payment medium; b) an application structure in a common payment medium; c) EFC application data in a common payment medium. The following are outside the scope of this document: —…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
03.220.20; 35.240.60