Affiner les résultats
Affichage de 1837 - 1848 de 2290
Avis d'intention
Sécurité de l'information, cybersécurité et protection...
This document provides guidance on concepts, objectives and processes for the governance of information security, by which organizations can evaluate, direct, monitor and communicate the information security-related processes...
Avis d'intention
Technologies de l'information - Méthodes d'essai...
This document defines test methods for performance characteristics of RFID tags for item management and specifies the general requirements and test requirements for tags which are applicable to the selection of devices for an...
Avis d'intention
Télécommunications et échange entre systèmes ...
For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802® Local Area Networks (LANs), this...
Avis d'intention
Ingénierie du logiciel et des systèmes - Outils...
This document, within the context of methods and tools for architecture design for software and systems product lines: — defines processes and their subprocesses performed during domain and application architecture design...
Avis d'intention
Technologies de l'information - Accessibilité...
This document gives guidance on how to create text alternatives and what information to put in text alternatives. This document applies to all static images that are used in any type of electronic document. It also applies to...
Avis d'intention
Ingénierie du logiciel et des systèmes - Outils...
This document, within the context of methods and tools for product line product management: — defines product line-specific processes and their subprocesses for product management of software and systems product lines. Those...
Avis d'intention
Gestion de la sécurité de l'information - Lignes...
This document provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organization’s information security risk management framework. This...
Avis d'intention
Technologies de l'information - Techniques de...
This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes: — the relationship between privacy...
Avis d'intention
Technologies de l'information - Cryptographie...
This document specifies MAC algorithms suitable for applications requiring lightweight cryptographic mechanisms. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an...
Avis d'intention
Technologies de l'information - Objet orienté...
1 Scope This document specifies an interface of a BioAPI C++ framework and BioAPI C++ BSP which will mirror the corresponding components specified in ISO/IEC 30106-1. The semantic equivalence of this document will be...
Avis d'intention
Sécurité de l'information - Cryptographie pour...
This document specifies broadcast authentication protocols, which are protocols that provide data integrity and entity authentication in a broadcast setting, i.e. a setting with one sender transmitting messages to many...
Avis d'intention
Technologies de l'information - Méthodes d'essai...
This document describes methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-22. This document contains conformance tests for all mandatory functions. The conformance parameters are the...