Search

Refine Results
International Classification for Standards (ICS) code
Source
Standards Development Organization (SDO) code
Language
Status
National Standards of Canada (NSC) code
Period range

From

To

Displaying 51 - 60 of 118
Information technology — Learning, education and training — Metadata for learning resources — Part 2...
ISO/IEC 19788 specifies, in a rule-based manner, metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of data elements and the specification of their attributes. These metadata elements are used to form the description of a learning resource, i.e. as a metadata learning resource (MLR) record. This part of ISO/…
Publisher :
CSA
Status :
Standard
Published Date :
2014-12-31
ICS Code(s) :
03.100.30; 35.240.99
Information technology — Business Operational View — Part 8: Identification of privacy protection re...
This part of ISO/IEC 15944: ? provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in Business Operational View (BOV) specifications for identifying the additional external constraints to be applied to recorded information in business transactions relating to personal information of an individual, as required by legal and…
Publisher :
CSA
Status :
Standard
Published Date :
2014-12-31
ICS Code(s) :
35.240.60
Information technology — Business Operational View — Part 5: Identification and referencing of requi...
1.1 Statement of scope The modelling of a business transaction through scenarios and scenario components is done by specifying the applicable constraints through explicitly stated rules. The Open-edi Reference Model identified two basic classes of constraints, namely “internal constraints” and “external constraints” (see further Annex G). ISO/IEC 15944-4 focuses on internal constraints with a…
Publisher :
CSA
Status :
Standard
Published Date :
2014-12-31
ICS Code(s) :
35.240.60
Health informatics — Audit trails for electronic health records
ISO 27789:2013 specifies a common framework for audit trails for electronic health records (EHR), in terms of audit trigger events and audit data, to keep the complete set of personal health information auditable across information systems and domains. It is applicable to systems processing personal health information which, complying with ISO 27799, create a secure audit record each time a user…
Publisher :
ISO
Status :
Withdrawn
Published Date :
2013-02-27
ICS Code(s) :
35.240.80
Information technology -- Modeling Languages -- Part 2: Syntax and Semantics for IDEF1X97 (IDEFobjec...
ISO/IEC/IEEE 31320-2:2012 describes the semantics and syntax of IDEF1X, a language used to represent a conceptual schema. Two styles of IDEF1X model are described. The key style is used to produce information models that represent the structure and semantics of data within an enterprise and is backward-compatible with the US government's Federal Information Processing Standard (FIPS) PUB…
Publisher :
IEC
Status :
Published
Published Date :
2012-09-13
ICS Code(s) :
35.080
Information technology — Modeling Languages — Part 2: Syntax and Semantics for IDEF1X97 (IDEFobject)
ISO/IEC/IEEE 31320-2:2012 describes the semantics and syntax of IDEF1X, a language used to represent a conceptual schema. Two styles of IDEF1X model are described. The key style is used to produce information models that represent the structure and semantics of data within an enterprise and is backward-compatible with the US government's Federal Information Processing Standard (FIPS) PUB…
Publisher :
ISO
Status :
Published
Published Date :
2012-09-13
ICS Code(s) :
35.080
Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life…
Publisher :
ISO
Status :
Published
Published Date :
2012-08-08
ICS Code(s) :
35.030
Guide to specification of hydraulic turbine governing systems
IEC 61362:2012 includes relevant technical data necessary to describe hydraulic turbine governing systems and to define their performance. It is aimed at unifying and thus facilitating the selection of relevant parameters in bidding specifications and technical bids. It will also serve as a basis for setting up technical guarantees. The scope of this standard is restricted to the turbine…
Publisher :
IEC
Status :
Published
Published Date :
2012-04-19
ICS Code(s) :
27.140
Information technology -- Business Operational View -- Part 8: Identification of privacy protection ...
The electronic version of this International Standard can be downloaded from the ISO/IEC Information Technology Task Force (ITTF) web site. ISO/IEC 15944-8:2012 has been developed to support modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of information and communications technology (ICT) based business…
Publisher :
IEC
Status :
Published
Published Date :
2012-03-28
ICS Code(s) :
35.240.60
Information technology — Computer graphics and image processing — Image Processing and Interchange (...
1 Scope This part of ISO/IEC 12087 establishes the specification of the Basic Image Interchange Format (BIIF) part of the standard. BIIF is a standard developed to provide a foundation for interoperability in the interchange of imagery and imagery-related data among applications. This part of ISO/IEC 12087 provides a detailed description of the overall structure of the format, as well as…
Publisher :
CSA
Status :
Standard
Published Date :
2012-02-29
ICS Code(s) :
35.140