Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 141 - 150 of 308
Information technology - Security techniques - Refining software vulnerability analysis under ISO/IE...
ISO/IEC TR 20004:2015 refines the AVA_VAN assurance family activities defined in ISO/IEC 18045 and provides more specific guidance on the identification, selection and assessment of relevant potential vulnerabilities in order to conduct an ISO/IEC 15408 evaluation of a software target of evaluation. This Technical Report leverages publicly available information security resources to support the…
Publisher :
IEC
Status :
Published
Published Date :
2015-12-07
ICS Code(s) :
35.030
Optical fibre cables - Part 1-1: Generic specification - General
IEC 60794-1-1:2015 is available as <a href="https://webstore.iec.ch/publication/23696">IEC 60794-1-1:2015 RLV</a> which contains the International Standard and its Redline version, showing all changes of the technical content compared to the previous edition.<br /> IEC 60794-1-1:2015 applies to optical fibre cables for use with communication equipment and devices…
Publisher :
IEC
Status :
Published
Published Date :
2015-11-12
ICS Code(s) :
33.180.10
Fixed electric double-layer capacitors for use in electric and electronic equipment - Part 1: Generi...
IEC 62391-1:2015 is available as <a href="https://webstore.iec.ch/publication/23570">IEC 62391-1:2015 RLV</a> which contains the International Standard and its Redline version, showing all changes of the technical content compared to the previous edition.<br /> <br /> IEC 62391-1:2015 applies to fixed electric double-layer capacitors (hereafter referred to as…
Publisher :
IEC
Status :
Published
Published Date :
2015-10-22
ICS Code(s) :
31.060.10
Intelligent transport systems — Reference model architecture(s) for the ITS sector — Part 1: ITS ser...
ISO 14813-1:2015 provides a description of the primary services that an ITS implementation can provide to ITS users. Those services with a common purpose can be collected together in "'ITS service domains'" and within these there can be a number of "'ITS service groups'" for particular parts of the domain. This part of ISO 14813 identifies thirteen service…
Publisher :
ISO
Status :
Withdrawn
Published Date :
2015-09-28
ICS Code(s) :
03.220.01; 35.240.60
Specification for radio disturbance and immunity measuring apparatus and methods - Part 3: CISPR tec...
CISPR TR 16-3:2010+A1:2012+A2:2015(E) is a collection of technical reports that serve as background and supporting information for the various other standards and technical reports in CISPR 16 series. In addition, background information is provided on the history of CISPR, as well as a historical reference on the measurement of interference power from household and similar appliances in the VHF…
Publisher :
IEC
Status :
Revised
Published Date :
2015-09-14
ICS Code(s) :
33.100.10; 33.100.20
Handling of health care waste materials
1.1 This Standard specifies requirements for the packaging, collection, handling, storage, and on-site treatment and disposal of health care waste materials. 1.2 1.2.1 This Standard applies to health care and veterinary–related waste, and health care–related waste generated in non-traditional health care settings. 1.2.2 “Health care and veterinary” refers to a) health care facilities and…
Publisher :
CSA
Status :
Withdrawn
Published Date :
2015-08-31
ICS Code(s) :
11.020; 11.020
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…
Publisher :
ISO
Status :
Withdrawn
Published Date :
2015-08-03
ICS Code(s) :
35.030
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric ...
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a) establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of…
Publisher :
IEC
Status :
Revised
Published Date :
2015-08-03
ICS Code(s) :
35.030
Radiological protection — Characteristics of reference pulsed radiation — Part 1: Photon radiation
ISO/TS 18090-1:2015 is directly applicable to pulsed X-radiation with pulse duration of 0,1 ms up to 10 s. This covers the whole range used in medical diagnostics at the time of publication. Some specifications may also be applicable for much shorter pulses; one example is the air kerma of one pulse. Such a pulse may be produced, e.g. by X-ray flash units or high-intensity femtosecond-lasers.…
Publisher :
ISO
Status :
Published
Published Date :
2015-07-20
ICS Code(s) :
13.280
Safety requirements for electrical equipment for measurement, control and laboratory use - Part 031:...
IEC 61010-031:2015 RLV contains both the official IEC International Standard and its Redline version. The Redline version is available in English only and provides you with a quick and easy way to compare all the changes between the official IEC Standard and its previous edition. IEC 61010-031:2015 specifies safety requirements for hand-held and hand-manipulated probe assemblies of the types…
Publisher :
IEC
Status :
Revised
Published Date :
2015-05-28
ICS Code(s) :
19.080