Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 141 - 150 de 237
Information technology - Modeling Languages - Part 2: Syntax and Semantics for IDEF1X97 (IDEFobject)
ISO/IEC/IEEE 31320-2:2012 describes the semantics and syntax of IDEF1X, a language used to represent a conceptual schema. Two styles of IDEF1X model are described. The key style is used to produce information models that represent the structure and semantics of data within an enterprise and is backward-compatible with the US government's Federal Information Processing Standard (FIPS) PUB…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2012-09-13
Code(s) de l'ICS :
35.080
Information technology — Modeling Languages — Part 2: Syntax and Semantics for IDEF1X97 (IDEFobject)
ISO/IEC/IEEE 31320-2:2012 describes the semantics and syntax of IDEF1X, a language used to represent a conceptual schema. Two styles of IDEF1X model are described. The key style is used to produce information models that represent the structure and semantics of data within an enterprise and is backward-compatible with the US government's Federal Information Processing Standard (FIPS) PUB…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2012-09-13
Code(s) de l'ICS :
35.080
Information technology - Security techniques - Security requirements for cryptographic modules
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2012-08-08
Code(s) de l'ICS :
35.030
Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life…
Éditeur :
ISO
Statut :
Annulée
Date de publication :
2012-08-08
Code(s) de l'ICS :
35.030
Guide to specification of hydraulic turbine governing systems
IEC 61362:2012 includes relevant technical data necessary to describe hydraulic turbine governing systems and to define their performance. It is aimed at unifying and thus facilitating the selection of relevant parameters in bidding specifications and technical bids. It will also serve as a basis for setting up technical guarantees. The scope of this standard is restricted to the turbine…
Éditeur :
IEC
Statut :
Révisé
Date de publication :
2012-04-19
Code(s) de l'ICS :
27.140
Information technology - Business operational view - Part 8: Identification of privacy protection re...
ISO/IEC 15944-8:2012 has been developed to support modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of information and communications technology (ICT) based business transaction where the individual has the role of a buyer. It provides users and designers with a methodology and tools addressing requirements…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2012-03-28
Code(s) de l'ICS :
35.240.63
Information technology — Business operational view — Part 8: Identification of privacy protection re...
ISO/IEC 15944-8:2012 has been developed to support modelling generic international requirements for identifying and providing privacy protection of personal information throughout any kind of information and communications technology (ICT) based business transaction where the individual has the role of a buyer. It provides users and designers with a methodology and tools addressing requirements…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2012-03-28
Code(s) de l'ICS :
35.240.63
Information technology — Computer graphics and image processing — Image Processing and Interchange (...
1 Scope This part of ISO/IEC 12087 establishes the specification of the Basic Image Interchange Format (BIIF) part of the standard. BIIF is a standard developed to provide a foundation for interoperability in the interchange of imagery and imagery-related data among applications. This part of ISO/IEC 12087 provides a detailed description of the overall structure of the format, as well as…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2012-02-29
Code(s) de l'ICS :
35.140
TECHNICAL GUIDEDevelopment, interpretation, and use of rainfall intensity-duration-frequency (IDF) i...
Introduction to this Guideline Water resources management infrastructures comprise one of the largest pools of capital stock owned and operated by municipal, provincial, and federal governments in Canada. In turn, every day Canadians rely on this infrastructure to help sustain their health and safety, protect their livelihoods, safeguard property, as well as to protect natural systems such…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2012-02-29
Code(s) de l'ICS :
01.110
Information technology - Learning, education and training - Metadata for learning resources - Part 3...
The primary purpose of ISO/IEC 19788 is to specify metadata elements and their attributes for the description of learning resources. This includes the rules governing the identification of data elements and the specification of their attributes. ISO/IEC 19788 provides data elements for the description of learning resources and resources directly related to learning resources. ISO/IEC 19788-3:2011…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2011-12-05
Code(s) de l'ICS :
03.100.30; 35.240.90