Software and systems engineering — Tools and methods for product line architecture design
1 Scope
This document, within the context of methods and tools for architecture design for software and systems product lines:
— defines processes and their subprocesses performed during domain and application architecture design. Those processes are described in terms of purpose, inputs, tasks and outcomes;
— defines method capabilities to support the defined tasks of each process;
— defines…
Software and systems engineering — Tools and methods for product line product management
1 Scope
This document, within the context of methods and tools for product line product management:
— defines product line-specific processes and their subprocesses for product management of software and systems product lines. Those processes are described in terms of purpose, inputs, tasks and outcomes;
— defines method capabilities to support the defined tasks of each process;
— defines…
Information security management — Guidelines for cyber-insurance
1 Scope
This document provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organization’s information security risk management framework.
This document gives guidelines for:
a) considering the purchase of cyber-insurance as a risk treatment option to share cyber-risks;
b) leveraging cyber-insurance to…
Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs)
1 Scope
This document specifies MAC algorithms suitable for applications requiring lightweight cryptographic mechanisms. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorized manner. They can also be used as message authentication mechanisms to provide assurance that a message has been originated by an entity in possession of the…
Information security — Lightweight cryptography — Part 7: Broadcast authentication protocols
1 Scope
This document specifies broadcast authentication protocols, which are protocols that provide data integrity and entity authentication in a broadcast setting, i.e. a setting with one sender transmitting messages to many receivers. To provide entity authentication, there needs to be a pre-existing infrastructure which links the sender to a cryptographic secret. The establishment of such an…
Information technology — Object oriented BioAPI — Part 4: C++ implementation
1 Scope
This document specifies an interface of a BioAPI C++ framework and BioAPI C++ BSP which will mirror the corresponding components specified in ISO/IEC 30106-1. The semantic equivalence of this document will be maintained with ISO/IEC 30106-2 (Java implementation) and ISO/IEC 30106-3 (C# implementation). In spite of the differences in actual parameters passed between functions, the names…
Information technology — Security techniques — Vulnerability handling processes
1 Scope
This document provides requirements and recommendations for how to process and remediate reported potential vulnerabilities in a product or service.
This document is applicable to vendors involved in handling vulnerabilities.
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and...
1 Scope
The ISO 30137 series is applicable to the use of biometrics in VSS (also known as Closed Circuit Television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities such as gait…
Information technology — Generic cabling for customer premises — Part 9907: Specifications for direc...
1 Scope
This part of ISO/IEC 11801, which is a Technical Report, provides definitions for, and
examples of, direct attach cabling configurations.
This document provides performance specifications for Classes D, E, EA, F, FA, I and II direct
attach cabling by reference to ISO/IEC 11801-1.
Informative limits for Class I direct attach cabling to support 5 m short reach mode application…