Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 32561 - 32570 of 32629
Road vehicles — Diagnostic communication over Internet Protocol (DoIP) — Part 2: Transport protocol ...
This document specifies the requirements for secured and unsecured diagnostic communication between client DoIP entity and server(s) installed in the vehicle using Internet protocol (IP) as well as the transmission control protocol (TCP) and user datagram protocol (UDP). This includes the definition of vehicle gateway requirements (e.g. for integration into an existing computer network) and test…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
43.040.10; 43.180
Information technology — JPEG AI learning-based image coding system — Part 1: Core coding system
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.040.30
Information géographique — Modèle du domaine de l'administration des terres (LADM) — Partie 4: ...
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.240.70
Information security, cybersecurity and privacy protection — Security and privacy requirements for a...
This document provides high level security and privacy requirements for authentication using biometrics on mobile devices, including security and privacy requirements for functional components, for communication, for storage and for remote processing. This document is applicable to remote modes, i.e., the cases that: - the biometric sample is captured through mobile devices; - the biometric…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030
Intelligent transport systems — Remote support for low speed automated driving systems (RS-LSADS) — ...
This document describes remote support, which is the provision of information or intervention in DDT to LSAD systems operated at Level 4 automation on predefined routes by a remotely located human in order to facilitate trip continuation. • This document is applicable to RS-LSADS in vehicles that provide passenger transport or logistics services on predefined routes. • This document defines the…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
03.220.20; 35.240.60
Road vehicles — Box task and detection response task to measure visual-manual and cognitive demand
This document defines key terms and parameters applied in the analysis of cognitive and visual-manual workload induced by transport information and control systems (TICS). It provides guidelines and minimum requirements on equipment and procedures for analysing cognitive and visual-manual load including assessment of TICS to: — plan evaluation trials; — specify (and install) data capture…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
13.180; 43.020
Informatique de santé — Exigences applicables aux prescriptions électroniques
ISO 17523 :2016 spécifie les exigences qui s'appliquent aux prescriptions électroniques. Elle décrit les principes génériques qui sont considérés comme importants pour l'ensemble des prescriptions électroniques. Le domaine d'application de l'ISO 17523 :2016 se limite au contenu de la prescription électronique elle-même, c'est-à-dire du document numérique qui est émis par…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.240.80
Gestion des ressources linguistiques — Cadre d’annotation sémantique (SemAF) — Partie 15: Extraction...
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
01.020
Information technology — Methodologies to evaluate the resistance of biometric systems to morphing a...
This standard establishes requirements for biometric recognition systems that could become subject to morphing attacks. The standard establishes: • Taxonomy of biometric sample modifications and manipulation with a specific focus on manipulations that constitute a multiple identity attack. This can be for instance an enrolment attack with face image morphing. • Requirements for testing databases…
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.240.15; 35.030
Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1...
Publisher :
ISO
Status :
Draft
Published Date :
1969-12-30
ICS Code(s) :
35.030