Information technology — Process assessment — An integrated process capability assessment model for ...
ISO/IEC 33071:2016 defines an integrated process assessment model for enterprise processes (process assessment model) for use in performing a conformant assessment of process capability in accordance with the requirements of ISO/IEC 33002.
The process assessment model integrates and harmonizes existing standards, as determined by stakeholders, and provides in a single document a process reference…
Intelligent transport systems — Emergency evacuation and disaster response and recovery — Part 1: Fr...
ISO/TR 19083-1:2016
- defines the framework for the ISO/TR 19083 series of standards related to emergency evacuation and disaster response and recovery,
- establishes the criteria under which public transport should support evacuations and disaster response and recovery based on the magnitude of the disaster and the location as these factors drive the policies, directives and plans for…
Identification cards — ICC-managed devices — Part 3: Organization, security and commands for interch...
ISO/IEC 18328-3:2016 specifies the logical interface of an application supporting the necessary security features in a card-IC which communicates with the external world by a physical interface supporting APDUs. This application supports the usage of electronic devices.
This involves the design of commands, data structures and security mechanisms which are required to handle the data and handling…
Systems and software engineering — Information technology project performance benchmarking framework...
ISO/IEC 29155-4:2016 provides general requirements and guidance for collecting and maintaining data of information technology (IT) projects and for delivering the benchmarking repository within benchmarking activities of "the IT project performance benchmarking framework" by prescribing the following:
a) requirements and guidance for data element definitions;
b) requirements and…
Information technology — Security techniques — Hash-functions — Part 1: General
ISO/IEC 10118-1:2016 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for
- reducing a message to a short imprint for input to a digital signature…
Hand- and machine-operated circular screwing dies for parallel pipe threads — G series
ISO 4231:2016 is a supplement to ISO 2568 and ISO 4230 and specifies the dimensions of hand- and machine-operated circular screwing dies intended for production of parallel pipe threads, G series, in accordance with ISO 228‑1.
The general dimensions of these dies (diameter, thickness and fixing dimensions) are in accordance with ISO 2568 so as to permit the driving of hand-operated dies with the…
Core drills with parallel shanks and with Morse taper shanks
ISO 7079:2016 specifies the dimensions of core drills with parallel shanks and with Morse taper shanks.
It includes two tables for each of the above specified types, giving respectively
- the dimensions for the preferred diameter (see Tables 1 and 2), and
- the corresponding lengths defined in terms of diameter ranges (see Tables 3 and 4).
The tables show only metric dimensions which…
Systems and software engineering - Information technology project performance benchmarking framework...
ISO/IEC 29155-4:2016 provides general requirements and guidance for collecting and maintaining data of information technology (IT) projects and for delivering the benchmarking repository within benchmarking activities of "the IT project performance benchmarking framework" by prescribing the following:
a) requirements and guidance for data element definitions;
b) requirements and…
Information technology - Security techniques - Hash-functions - Part 1: General
ISO/IEC 10118-1:2016 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper bounded) length to fixed-length strings of bits, using a specified algorithm. They can be used for
- reducing a message to a short imprint for input to a digital signature…
Identification cards - ICC-managed devices - Part 3: Organization, security and commands for interch...
ISO/IEC 18328-3:2016 specifies the logical interface of an application supporting the necessary security features in a card-IC which communicates with the external world by a physical interface supporting APDUs. This application supports the usage of electronic devices.
This involves the design of commands, data structures and security mechanisms which are required to handle the data and handling…