Affiner les résultats
Affichage de 1765 - 1776 de 2290
Avis d'intention
Ingénierie du logiciel et des systèmes - Outils...
This document, within the context of methods and tools for product line product management: — defines product line-specific processes and their subprocesses for product management of software and systems product lines. Those...
Avis d'intention
Gestion de la sécurité de l'information - Lignes...
This document provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organization’s information security risk management framework. This...
Avis d'intention
Technologies de l'information - Techniques de...
This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes: — the relationship between privacy...
Avis d'intention
Technologies de l'information - Cryptographie...
This document specifies MAC algorithms suitable for applications requiring lightweight cryptographic mechanisms. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an...
Avis d'intention
Technologies de l'information - Objet orienté...
1 Scope This document specifies an interface of a BioAPI C++ framework and BioAPI C++ BSP which will mirror the corresponding components specified in ISO/IEC 30106-1. The semantic equivalence of this document will be...
Avis d'intention
Sécurité de l'information - Cryptographie pour...
This document specifies broadcast authentication protocols, which are protocols that provide data integrity and entity authentication in a broadcast setting, i.e. a setting with one sender transmitting messages to many...
Avis d'intention
Technologies de l'information - Méthodes d'essai...
This document describes methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-22. This document contains conformance tests for all mandatory functions. The conformance parameters are the...
Avis d'intention
Techniques de sécurité IT - Authentification ...
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity. Ten mechanisms are specified in this document...
Avis d'intention
Technologies de l´information - Télécommunications...
This standard defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information...
Avis d'intention
Technologies de l´information - Télécommunications...
This standard defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information...
Avis d'intention
Technologies de l´information - Télécommunications...
This standard defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information...
Avis d'intention
Technologies de l´information - Télécommunications...
This standard defines Ethernet local area, access and metropolitan area networks. Ethernet is specified at selected speeds of operation; and uses a common media access control (MAC) specification and management information...