Information technology - Use of biometrics in video surveillance systems - Part 1: System design and...
The ISO/IEC 30137 series is applicable to the use of biometrics in VSSs (also known as closed circuit television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post-event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities, such as gait…
Information technology — Use of biometrics in video surveillance systems — Part 1: System design and...
The ISO/IEC 30137 series is applicable to the use of biometrics in VSSs (also known as closed circuit television or CCTV systems) for a number of scenarios, including real-time operation against watchlists and in post-event analysis of video data. In most cases, the biometric mode of choice will be face recognition, but this document also provides guidance for other modalities, such as gait…
Information security - Secure multiparty computation - Part 2: Mechanisms based on secret sharing
This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 19592-2. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions…
Information security — Secure multiparty computation — Part 2: Mechanisms based on secret sharing
This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 19592-2. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure auctions…
Information technology — Information security incident management — Part 1: Principles and process
Scope
This document is the foundation of the ISO/IEC 27035 series. It presents basic concepts, principles and process with key activities of information security incident management, which provide a structured approach to preparing for, detecting, reporting, assessing, and responding to incidents, and applying lessons learned.
The guidance on the information security incident management process…
Nanomanufacturing - Key control characteristics - Part 6-4: Graphene-based materials - Surface condu...
IEC TS 62607-6-4:2024 has been prepared by IEC technical committee 113: Nanotechnology for electrotechnical products and systems. It is a Technical Specification.
This second edition cancels and replaces the first edition published in 2016. This edition constitutes a technical revision.
This edition includes the following significant technical changes with respect to the previous edition:
a)…
Stationary source emissions — Determination of the mass concentration of sulfur dioxide in flue gase...
This document specifies a method for the determination of sulfur dioxide (SO2) in flue gases of stationary sources and describes the fundamental structure and the key performance characteristics of automated measuring systems.
The method allows continuous monitoring with permanently installed measuring systems of SO2 emissions.
This document describes extractive systems and in situ (non-…
Intelligent transport systems (ITS) — Communications — ITS communication role and functional model
This document describes a basic role model of communications as a common platform for ITS services including cooperative service in smart city areas:
a) a framework for the provision of a communication service;
b) a description of the concept of operations and the role models;
c) a conceptual architecture between actors involved in the provision/receipt of communication;
d…