Rechercher

Affiner les résultats
Taper
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Date de publication

Di

à

Affichage de 1873 - 1884 de 12103
Avis d'intention

Technologies de l'information - Techniques de...

This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved...
Avis d'intention

Technologies de l'information - Techniques de...

This part of ISO/IEC 13888 serves as a general model for subsequent parts specifying non-repudiation mechanisms using cryptographic techniques. ISO/IEC 13888 provides non-repudiation mechanisms for the following phases of non...
Avis d'intention

Technologies de l'information - Techniques de...

This Technical Report provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408. It is also applicable to...
Avis d'intention

Technologies de l'information - Techniques de...

This part of ISO/IEC 15408 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the International Standard which in its entirety is...
Avis d'intention

Technologies de l'information - Techniques de...

This part of ISO/IEC 18014 presents a general framework for the provision of time-stamping services. Time-stamping services may generate, renew and verify time-stamp tokens. Time-stamp tokens are associations between data and...