Affiner les résultats
Affichage de 1549 - 1560 de 12891
Avis d'intention
Technologies de l'information - Accueil Système...
This part of ISO/IEC 18012 specifies requirements for product interoperability in the area of home and building automation systems. It specifies layers six and seven of the OSI reference model (see ISO/IEC 7498-1) with...
Avis d'intention
Technologies de l'information - Exigences de ...
ISO/IEC 14762 sets the requirements for functional safety for Home and Building Electronic Systems (HBES) products and systems, a multi-application bus system where the functions are decentralised, distributed and linked...
Avis d'intention
Technologie de l'information - Techniques de ...
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map arbitrary strings of bits to a fixed-length strings of bits...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques: - mechanisms based on identities and providing unilateral authentication; - mechanisms based on integer factorization and...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 13888 serves as a general model for subsequent parts specifying non-repudiation mechanisms using cryptographic techniques. ISO/IEC 13888 provides non-repudiation mechanisms for the following phases of non...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 13888 specifies mechanisms for the provision of specific, communication related, non-repudiation services using asymmetric cryptographic techniques.
Avis d'intention
Technologies de l'information - Techniques de...
This Technical Report provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408. It is also applicable to...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 15408 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the International Standard which in its entirety is...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 18014 describes: -a general model for time-stamping services producing linked tokens, -describes the basic components used to construct a time-stamping service producing linked tokens, -defines the data...
Avis d'intention
Information technology - Security techniques...
This International Standard focuses on the critical aspects needed for successful design and implementation of an Information Security Management System (ISMS) in accordance with ISO/IEC 27001:2005. It describes the process...
Avis d'intention
Technologies de l'information - Techniques de...
This International Standard provides guidance on the development and use of measures and measurement in order to assess the effectiveness of an implemented information security management system (ISMS) andcontrols or groups...
Spacer