Affiner les résultats
Affichage de 1873 - 1884 de 12103
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques: - mechanisms based on identities and providing unilateral authentication; - mechanisms based on integer factorization and...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 13888 serves as a general model for subsequent parts specifying non-repudiation mechanisms using cryptographic techniques. ISO/IEC 13888 provides non-repudiation mechanisms for the following phases of non...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 13888 specifies mechanisms for the provision of specific, communication related, non-repudiation services using asymmetric cryptographic techniques.
Avis d'intention
Technologies de l'information - Techniques de...
This Technical Report provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408. It is also applicable to...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 15408 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the International Standard which in its entirety is...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 18014 describes: -a general model for time-stamping services producing linked tokens, -describes the basic components used to construct a time-stamping service producing linked tokens, -defines the data...
Avis d'intention
Information technology - Security techniques...
This International Standard focuses on the critical aspects needed for successful design and implementation of an Information Security Management System (ISMS) in accordance with ISO/IEC 27001:2005. It describes the process...
Avis d'intention
Technologies de l'information - Techniques de...
This International Standard provides guidance on the development and use of measures and measurement in order to assess the effectiveness of an implemented information security management system (ISMS) andcontrols or groups...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 18014 presents a general framework for the provision of time-stamping services. Time-stamping services may generate, renew and verify time-stamp tokens. Time-stamp tokens are associations between data and...
Avis d'intention
Technologies de l'information - Techniques de...
This part of ISO/IEC 27033 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security...
Avis d'intention
Technologie de l'information - Codage générique...
The concepts and protocols of this part of ISO/IEC 138 18 (DSM-CC) provide the general capability to browse, select, download, and control a variety of bit stream types. DSM-CC also provides a mechanism to manage network and...