Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 1501 - 1510 de 1727
Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level...
This part of ISO 9735 for batch EDIFACT security defines the security key and certificate management message KEYMAN.
Éditeur :
ISO
Statut :
Publié
Date de publication :
2002-07-03
Code(s) de l'ICS :
35.240.63
Information technology — Security techniques — Guidelines for the use and management of Trusted Thir...
Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and services, etc. This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP services, the generic security requirements…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2002-06-26
Code(s) de l'ICS :
35.030
Information technology - Security techniques - Guidelines for the use and management of Trusted Thir...
Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and services, etc. This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP services, the generic security requirements…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2002-06-26
Code(s) de l'ICS :
35.030
Industrial automation systems and integration — Product data representation and exchange — Part 232:...
This part of ISO 10303 specifies the use of the integrated resources necessary for the scope and information requirements for Technical Data Packages (TDPs) (see 3.5.28) to be exchanged among product data management systems. Each enterprise uses content, format, and the level of configuration control as parameters when establishing its product exchange or access requirements among business…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2002-06-19
Code(s) de l'ICS :
25.040.40
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechani...
ISO/IEC 9797-2:2002 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can also be used as message authentication mechanisms to provide assurance that a message has been…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2002-06-12
Code(s) de l'ICS :
35.030
Non-destructive testing — Radiation methods — Computed tomography — Part 1: Principles
ISO 15708-1 provides a tutorial introduction to the theory and use of computed tomography. It begins with an overview intended for the interested reader possessing a general technical background. Subsequent, more technical clauses describe the physical and mathematical basis of CT technology, the hardware and software requirements of CT equipment, and the fundamental measures of CT performance.…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2002-06-12
Code(s) de l'ICS :
19.100
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechani...
ISO/IEC 9797-2:2002 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can also be used as message authentication mechanisms to provide assurance that a message has been…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2002-06-12
Code(s) de l'ICS :
35.030
Banking — Personal Identification Number (PIN) management and security — Part 1: Basic principles an...
This part of ISO 9564 specifies the basic principles and techniques which provide the minimum security measures required for effective international PIN management. These measures are applicable to those institutions responsible for implementing techniques for the management and protection of PINs. This part of ISO 9564 also specifies PIN protection techniques applicable to financial transaction…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2002-05-01
Code(s) de l'ICS :
35.240.40
Information Technology - Fibre Distributed Data Interface (FDDI) - Part 4: Single-Mode Fibre Physica...
This National Standard of Canada is equivalent to International Standard ISO/IEC 9314-4:1999. 1 Scope This part of ISO/IEC 9314 specifies the Single-mode fibre Physical Layer Medium Dependent (SMF-PMD) requirements for the Fibre Distributed Data Interface (FDDI). FDDI provides a high bandwidth (100 megabits per second) general purpose interconnection among computers and peripheral…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2002-02-28
Code(s) de l'ICS :
35.110; 33.180.01
Information Technology - Security Techniques - Message Authentication Codes (MACs) - Part 1: Mechani...
This National Standard of Canada is equivalent to International Standard ISO/IEC 9797-1:1999 (first edition, 1999-12-15). 1 Scope This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can…
Éditeur :
CSA
Statut :
Annulée
Date de publication :
2002-02-28
Code(s) de l'ICS :
35.040

Spacer