Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 701 - 710 of 32312
Information security - Secure multiparty computation - Part 2: Mechanisms based on secret sharing
This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 19592-2. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions…
Publisher :
IEC
Status :
Published
Published Date :
2024-03-05
ICS Code(s) :
35.030
Information security, cybersecurity and privacy protection — Ontology building blocks for security a...
This document defines an inventory of building blocks conceptually associated with different types of assessments of information and communication technology (ICT) trustworthiness. These assessments apply to areas such as governance, risk management, security evaluation, secure development lifecycle (SDL), supply chain integrity and privacy. This document also defines an ontology that organizes…
Publisher :
ISO
Status :
Published
Published Date :
2024-03-04
ICS Code(s) :
35.030
Data quality — Part 114: Master data: Application of ISO/IEC 21778 and ISO 8000-115 to portable data
This document specifies requirements for data to be portable data. The following are within the scope of this document: —     fundamental principles and assumptions for portable data; —     the role of semantic encoding in making data portable; —     the syntax of a structured format for portable data; —     the metadata and the reference data to include as part of portable data. The following…
Publisher :
ISO
Status :
Published
Published Date :
2024-03-04
ICS Code(s) :
25.040.40
Information security, cybersecurity and privacy protection - Ontology building blocks for security a...
This document defines an inventory of building blocks conceptually associated with different types of assessments of information and communication technology (ICT) trustworthiness. These assessments apply to areas such as governance, risk management, security evaluation, secure development lifecycle (SDL), supply chain integrity and privacy. This document also defines an ontology that organizes…
Publisher :
IEC
Status :
Published
Published Date :
2024-03-04
ICS Code(s) :
35.030
Sécurité de l'information, cybersécurité et protection de la vie privée — Exigences pour les or...
Le présent document spécifie les exigences et fournit des recommandations pour les organismes procédant à l'audit et à la certification d'un système de management de la sécurité de l'information (SMSI), en plus des exigences contenues dans l'ISO/IEC 17021‑1. Les organismes qui procèdent à la certification de systèmes ISMS démontrent qu'ils respectent les exigences de…
Publisher :
ISO
Status :
Published
Published Date :
2024-02-29
ICS Code(s) :
03.120.20; 35.030
Robinets en matériaux thermoplastiques — Couple de manoeuvre — Méthode d'essai
Le présent document spécifie une méthode d’essai pour la détermination du couple d’ouverture, de fermeture et de fonctionnement des robinets en matériaux thermoplastiques. Le présent document s’applique à tous les types de robinets en matériaux thermoplastiques manœuvrables manuellement, avec ou sans actionneur, destinés à être utilisés pour le transport des fluides. NOTE 1        Des exemples de…
Publisher :
ISO
Status :
Published
Published Date :
2024-02-29
ICS Code(s) :
23.060.01; 83.140.30
Thermoplastics valves — Torque — Test method
This document specifies a test method for the determination of the opening, closing and running torque of thermoplastics valves. This document is applicable to all types of manually operable thermoplastics valves, with or without actuator, intended to be used for the transport of fluids. NOTE 1        Examples of valve types tested with this method are in ISO 4437-4, ISO 16135, ISO 16136, ISO …
Publisher :
ISO
Status :
Published
Published Date :
2024-02-29
ICS Code(s) :
23.060.01; 83.140.30
Information security, cybersecurity and privacy protection — Requirements for bodies providing audit...
This document specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1. The requirements contained in this document are demonstrated in terms of competence and reliability by bodies providing ISMS certification. The guidance contained in this…
Publisher :
ISO
Status :
Published
Published Date :
2024-02-29
ICS Code(s) :
03.120.20; 35.030
Information security, cybersecurity and privacy protection - Requirements for bodies providing audit...
This document specifies requirements and provides guidance for bodies providing audit and certification of an information security management system (ISMS), in addition to the requirements contained within ISO/IEC 17021-1. The requirements contained in this document are demonstrated in terms of competence and reliability by bodies providing ISMS certification. The guidance contained in this…
Publisher :
IEC
Status :
Published
Published Date :
2024-02-29
ICS Code(s) :
03.120.20; 35.030
Sécurité de l'information, cybersécurité et protection de la vie privée - Exigences pour les or...
Le présent document spécifie les exigences et fournit des recommandations pour les organismes procédant à l'audit et à la certification d'un système de management de la sécurité de l'information (SMSI), en plus des exigences contenues dans l'ISO/IEC 17021‑1. Les organismes qui procèdent à la certification de systèmes ISMS démontrent qu'ils respectent les exigences de…
Publisher :
IEC
Status :
Published
Published Date :
2024-02-29
ICS Code(s) :
03.120.20; 35.030