Information technology — Security techniques — Guidelines for the use and management of Trusted Thir...
Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for
which general guidance is necessary to assist business entities, developers and providers of systems and services, etc.
This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP
services, the generic security requirements…
Information technology - Security techniques - Guidelines for the use and management of Trusted Thir...
Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for
which general guidance is necessary to assist business entities, developers and providers of systems and services, etc.
This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP
services, the generic security requirements…
Industrial automation systems and integration — Product data representation and exchange — Part 232:...
This part of ISO 10303 specifies the use of the integrated resources necessary for the scope and information requirements for Technical Data Packages (TDPs) (see 3.5.28) to be exchanged among product data management systems.
Each enterprise uses content, format, and the level of configuration control as parameters when establishing its product exchange or access requirements among business…
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechani...
ISO/IEC 9797-2:2002 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can also be used as message authentication mechanisms to provide assurance that a message has been…
ISO 15708-1 provides a tutorial introduction to the theory and use of computed tomography. It begins with an overview intended for the interested reader possessing a general technical background. Subsequent, more technical clauses describe the physical and mathematical basis of CT technology, the hardware and software requirements of CT equipment, and the fundamental measures of CT performance.…
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechani...
ISO/IEC 9797-2:2002 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can also be used as message authentication mechanisms to provide assurance that a message has been…
Banking — Personal Identification Number (PIN) management and security — Part 1: Basic principles an...
This part of ISO 9564 specifies the basic principles and techniques which provide the minimum security measures required for effective international PIN management. These measures are applicable to those institutions responsible for implementing techniques for the management and protection of PINs.
This part of ISO 9564 also specifies PIN protection techniques applicable to financial transaction…
Information Technology - Fibre Distributed Data Interface (FDDI) - Part 4: Single-Mode Fibre Physica...
This National Standard of Canada is equivalent to International Standard ISO/IEC 9314-4:1999.
1 Scope
This part of ISO/IEC 9314 specifies the Single-mode fibre Physical Layer Medium Dependent (SMF-PMD) requirements for the Fibre Distributed Data Interface (FDDI). FDDI provides a high bandwidth (100 megabits per second) general purpose interconnection among computers and peripheral…
Information Technology - Security Techniques - Message Authentication Codes (MACs) - Part 1: Mechani...
This National Standard of Canada is equivalent to International Standard ISO/IEC 9797-1:1999 (first edition, 1999-12-15).
1 Scope
This part of ISO/IEC 9797 specifies six MAC algorithms that use a secret key and an n-bit block cipher to calculate an m-bit MAC. These mechanisms can be used as data integrity mechanisms to verify that data has not been altered in an unauthorised manner. They can…